First published: Wed Jan 20 2021(Updated: )
Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Vert.x-Web | =4.0.0-milestone1 | |
Eclipse Vert.x-Web | =4.0.0-milestone2 | |
Eclipse Vert.x-Web | =4.0.0-milestone3 | |
Eclipse Vert.x-Web | =4.0.0-milestone4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-35217.
The severity of CVE-2020-35217 is high.
The affected software for CVE-2020-35217 is Eclipse Vert.x-web version 4.0.0 milestone 1-4.
This vulnerability allows an attacker to bypass CSRF verification by comparing the CSRF token in the cookie against a CSRF token that is stored in the session.
Yes, a fix has been implemented. Please refer to the provided reference for more information.