CVE-2020-35217

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-35217
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35217.json
Aliases
Published
2021-01-20T13:15:12Z
Modified
2023-11-29T08:30:12.707243Z
Details

Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.

References

Affected packages

Git / github.com/vert-x3/vertx-web

Affected ranges

Type
GIT
Repo
https://github.com/vert-x3/vertx-web
Events

Affected versions

3.*

3.0.0
3.0.0-milestone2
3.0.0-milestone3
3.0.0-milestone4
3.0.0-milestone5
3.0.0-milestone6
3.1.0
3.2.0
3.2.1
3.3.0
3.3.0.CR2
3.3.1
3.3.2
3.3.3
3.4.0
3.4.0.Beta1
3.4.1
3.4.2
3.5.0
3.5.0.Beta1
3.5.1
3.6.0
3.6.0.CR1
3.6.0.CR2

4.*

4.0.0-milestone1
4.0.0-milestone2
4.0.0-milestone4
4.0.0-milestone5
4.0.0.Beta1
4.0.0.Beta2
4.0.0.Beta3
4.0.0.CR1