First published: Thu Jul 12 2018(Updated: )
In version from 3.0.0 to 3.5.2 of Eclipse Vert.x, the CSRFHandler do not assert that the XSRF Cookie matches the returned XSRF header/form parameter. This allows replay attacks with previously issued tokens which are not expired yet.
Credit: emo@eclipse.org emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Vert.x | >=3.0.0<=3.5.2 | |
redhat/vertex-web | <3.5.3 | 3.5.3 |
maven/io.vertx:vertx-web | >=3.0.0<3.5.3 | 3.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12540 is rated as a medium severity vulnerability due to its potential for replay attacks.
To fix CVE-2018-12540, upgrade Eclipse Vert.x to version 3.5.3 or later.
Versions of Eclipse Vert.x from 3.0.0 to 3.5.2 are affected by CVE-2018-12540.
CVE-2018-12540 allows replay attacks with previously issued tokens that are not expired.
Yes, the CSRFHandler is secure in versions after 3.5.2 as it addresses the vulnerability.