CVE Vulnerabilities

CVE-2021-31408

Insufficient Session Expiration

Published: Apr 23, 2021 | Modified: May 04, 2021
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CVSS 2.x
3.3 LOW
AV:L/AC:M/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Flow Vaadin 5.0.0 (including) 6.0.0 (excluding)
Flow Vaadin 6.0.0 (including) 6.0.5 (excluding)
Vaadin Vaadin 19.0.0 (including) 19.0.4 (excluding)
Vaadin Vaadin 18.0.0 (including) 18.0.0 (including)

Potential Mitigations

References