Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone1:*:*:*:*:*:*", "matchCriteriaId": "F0F457CC-5438-41C2-A310-B03555BD980D", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone2:*:*:*:*:*:*", "matchCriteriaId": "13DB2E1F-461B-4795-81F1-0BD0BB6D9A4F", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone3:*:*:*:*:*:*", "matchCriteriaId": "765F70D9-FAE6-4037-80CB-65A88DC42277", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:vert.x-web:4.0.0:milestone4:*:*:*:*:*:*", "matchCriteriaId": "51B1F031-23B1-4F64-B189-6EEED4C13C32", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack."}, {"lang": "es", "value": "El framework Vert.x-Web versi\u00f3n v4.0 milestone 1-4, no lleva a cabo una comprobaci\u00f3n de CSRF correcta. En lugar de comparar el token CSRF en la petici\u00f3n con el token CSRF en la cookie, compara el token CSRF en la cookie con un token CSRF que est\u00e1 almacenado en la sesi\u00f3n. Un atacante ni siquiera necesita proporcionar un token CSRF en la petici\u00f3n porque el framework no lo considera. Las cookies son enviadas autom\u00e1ticamente por el navegador y la comprobaci\u00f3n siempre se realizar\u00e1 correctamente, conllevando a un ataque de tipo CSRF con \u00e9xito"}], "id": "CVE-2020-35217", "lastModified": "2024-11-21T05:27:02.353", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-01-20T13:15:12.440", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/vert-x3/vertx-web/pull/1613"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/vert-x3/vertx-web/pull/1613"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-352"}], "source": "nvd@nist.gov", "type": "Primary"}]}