Missing output sanitization in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL
[
{
"source": "https://github.com/vaadin/flow/commit/96ebe74d7819acea6bf720ad39af1d12132a8956",
"deprecated": false,
"id": "CVE-2019-25027-724dc12d",
"target": {
"file": "flow-server/src/main/java/com/vaadin/flow/component/UI.java"
},
"digest": {
"line_hashes": [
"261953307091429512020813919124974003204",
"329533054537719354414092760958815002704",
"313930173888583270381484067923183456160",
"162146791431649347363597301744334728147",
"242797645317436500196535946665471567281",
"286910172304206219900340701977937062437",
"278181443505157423786147500441283476047",
"303837510556439872409158675732397683248",
"153768064545624599271116704130548139556",
"109483147727043905708274744426371902544",
"259870548858588817648333372768790484811",
"325017224019585151779266844960186116358",
"106226419683089484003885099097620599339",
"329760685973920828001511732786776132401",
"158446089771610535504004077417513645932",
"278220728157201837614615789759340673763",
"124408381347879013080958365972561941930",
"154785131295333403489954052243911469192",
"135046169291699858826297569535737011561"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1"
}
]