Show plain JSON{"containers": {"cna": {"affected": [{"product": "Vaadin", "vendor": "Vaadin", "versions": [{"changes": [{"at": "15.0.0", "status": "affected"}, {"at": "19.0.0", "status": "unaffected"}, {"at": "19.0.0", "status": "affected"}], "lessThan": "*", "status": "affected", "version": "14.0.3", "versionType": "custom"}]}, {"product": "flow-server", "vendor": "Vaadin", "versions": [{"changes": [{"at": "3.0.0", "status": "affected"}, {"at": "6.0.0", "status": "unaffected"}, {"at": "6.0.0", "status": "affected"}], "lessThan": "*", "status": "affected", "version": "2.0.9", "versionType": "custom"}]}], "datePublic": "2021-05-04T00:00:00", "descriptions": [{"lang": "en", "value": "Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds."}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-379", "description": "CWE-379 Creation of Temporary File in Directory with Incorrect Permissions", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2021-05-05T18:15:13", "orgId": "9e0f3122-90e9-42d5-93de-8c6b98deef7e", "shortName": "Vaadin"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://vaadin.com/security/cve-2021-31411"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://github.com/vaadin/flow/pull/10640"}], "source": {"discovery": "INTERNAL"}, "title": "Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"AKA": "", "ASSIGNER": "security@vaadin.com", "DATE_PUBLIC": "2021-05-04T08:17:00.000Z", "ID": "CVE-2021-31411", "STATE": "PUBLIC", "TITLE": "Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Vaadin", "version": {"version_data": [{"platform": "", "version_affected": ">=", "version_name": "", "version_value": "14.0.3"}, {"platform": "", "version_affected": "<=", "version_name": "", "version_value": "14.5.2 +1"}, {"platform": "", "version_affected": ">=", "version_name": "", "version_value": "15.0.0"}, {"platform": "", "version_affected": "<", "version_name": "", "version_value": "19.0.0"}, {"platform": "", "version_affected": ">=", "version_name": "", "version_value": "19.0.0"}, {"platform": "", "version_affected": "<=", "version_name": "", "version_value": "19.0.4 +1"}]}}, {"product_name": "flow-server", "version": {"version_data": [{"platform": "", "version_affected": ">=", "version_name": "", "version_value": "2.0.9"}, {"platform": "", "version_affected": "<=", "version_name": "", "version_value": "2.5.2 +1"}, {"platform": "", "version_affected": ">=", "version_name": "", "version_value": "3.0.0"}, {"platform": "", "version_affected": "<", "version_name": "", "version_value": "6.0.0"}, {"platform": "", "version_affected": ">=", "version_name": "", "version_value": "6.0.0"}, {"platform": "", "version_affected": "<=", "version_name": "", "version_value": "6.0.5 +1"}]}}]}, "vendor_name": "Vaadin"}]}}, "configuration": [], "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds."}]}, "exploit": [], "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-379 Creation of Temporary File in Directory with Incorrect Permissions"}]}]}, "references": {"reference_data": [{"name": "https://vaadin.com/security/cve-2021-31411", "refsource": "CONFIRM", "url": "https://vaadin.com/security/cve-2021-31411"}, {"name": "https://github.com/vaadin/flow/pull/10640", "refsource": "CONFIRM", "url": "https://github.com/vaadin/flow/pull/10640"}]}, "solution": [], "source": {"advisory": "", "defect": [], "discovery": "INTERNAL"}, "work_around": []}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T22:55:53.894Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://vaadin.com/security/cve-2021-31411"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://github.com/vaadin/flow/pull/10640"}]}]}, "cveMetadata": {"assignerOrgId": "9e0f3122-90e9-42d5-93de-8c6b98deef7e", "assignerShortName": "Vaadin", "cveId": "CVE-2021-31411", "datePublished": "2021-05-05T18:15:13.220834Z", "dateReserved": "2021-04-15T00:00:00", "dateUpdated": "2024-09-16T18:08:17.789Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}