CVE-2020-35217 (GCVE-0-2020-35217)

Vulnerability from cvelistv5 – Published: 2021-01-20 12:28 – Updated: 2024-08-04 17:02
VLAI?
Summary
Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:02:06.925Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/vert-x3/vertx-web/pull/1613"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-20T12:28:44",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/vert-x3/vertx-web/pull/1613"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-35217",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/vert-x3/vertx-web/pull/1613",
              "refsource": "MISC",
              "url": "https://github.com/vert-x3/vertx-web/pull/1613"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-35217",
    "datePublished": "2021-01-20T12:28:44",
    "dateReserved": "2020-12-13T00:00:00",
    "dateUpdated": "2024-08-04T17:02:06.925Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0F457CC-5438-41C2-A310-B03555BD980D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone2:*:*:*:*:*:*\", \"matchCriteriaId\": \"13DB2E1F-461B-4795-81F1-0BD0BB6D9A4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone3:*:*:*:*:*:*\", \"matchCriteriaId\": \"765F70D9-FAE6-4037-80CB-65A88DC42277\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone4:*:*:*:*:*:*\", \"matchCriteriaId\": \"51B1F031-23B1-4F64-B189-6EEED4C13C32\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.\"}, {\"lang\": \"es\", \"value\": \"El framework Vert.x-Web versi\\u00f3n v4.0 milestone 1-4, no lleva a cabo una comprobaci\\u00f3n de CSRF correcta.\u0026#xa0;En lugar de comparar el token CSRF en la petici\\u00f3n con el token CSRF en la cookie, compara el token CSRF en la cookie con un token CSRF que est\\u00e1 almacenado en la sesi\\u00f3n.\u0026#xa0;Un atacante ni siquiera necesita proporcionar un token CSRF en la petici\\u00f3n porque el framework no lo considera.\u0026#xa0;Las cookies son enviadas autom\\u00e1ticamente por el navegador y la comprobaci\\u00f3n siempre se realizar\\u00e1 correctamente, conllevando a un ataque de tipo CSRF con \\u00e9xito\"}]",
      "id": "CVE-2020-35217",
      "lastModified": "2024-11-21T05:27:02.353",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2021-01-20T13:15:12.440",
      "references": "[{\"url\": \"https://github.com/vert-x3/vertx-web/pull/1613\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/vert-x3/vertx-web/pull/1613\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-352\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-35217\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-01-20T13:15:12.440\",\"lastModified\":\"2024-11-21T05:27:02.353\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.\"},{\"lang\":\"es\",\"value\":\"El framework Vert.x-Web versi\u00f3n v4.0 milestone 1-4, no lleva a cabo una comprobaci\u00f3n de CSRF correcta.\u0026#xa0;En lugar de comparar el token CSRF en la petici\u00f3n con el token CSRF en la cookie, compara el token CSRF en la cookie con un token CSRF que est\u00e1 almacenado en la sesi\u00f3n.\u0026#xa0;Un atacante ni siquiera necesita proporcionar un token CSRF en la petici\u00f3n porque el framework no lo considera.\u0026#xa0;Las cookies son enviadas autom\u00e1ticamente por el navegador y la comprobaci\u00f3n siempre se realizar\u00e1 correctamente, conllevando a un ataque de tipo CSRF con \u00e9xito\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F457CC-5438-41C2-A310-B03555BD980D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"13DB2E1F-461B-4795-81F1-0BD0BB6D9A4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"765F70D9-FAE6-4037-80CB-65A88DC42277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"51B1F031-23B1-4F64-B189-6EEED4C13C32\"}]}]}],\"references\":[{\"url\":\"https://github.com/vert-x3/vertx-web/pull/1613\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vert-x3/vertx-web/pull/1613\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…