2023-06-30 18:00:43 +00:00

197 lines
6.5 KiB
JSON

{
"id": "CVE-2023-25500",
"sourceIdentifier": "security@vaadin.com",
"published": "2023-06-22T13:15:09.737",
"lastModified": "2023-06-30T16:32:11.590",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security@vaadin.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "security@vaadin.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.23",
"matchCriteriaId": "12F1F29D-69E8-406E-BB2F-EA3F141CECD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "14.10.2",
"matchCriteriaId": "78FA5E6A-3D73-4CB9-8724-B7DBFC48A1B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0.0",
"versionEndIncluding": "22.0.28",
"matchCriteriaId": "D0719ACD-F9D0-4E28-82BC-AEFE4EB19729"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.3.14",
"matchCriteriaId": "9346B94F-48B9-429C-8976-DEC37B7D00F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.7",
"matchCriteriaId": "48E0C567-8C7F-4572-BC4F-F174C6058974"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "5131784E-6951-4BA6-A473-10BE06E3E0F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "07747F12-9827-4543-B66F-253326EC247F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "BD57A5F3-CB86-4B35-823B-DCAEB163D4CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha4:*:*:*:*:*:*",
"matchCriteriaId": "EB94F579-CDCE-4FA4-BCAF-7747813FB7A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha5:*:*:*:*:*:*",
"matchCriteriaId": "4464403F-682A-4506-99E7-2CC4E4288C0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha6:*:*:*:*:*:*",
"matchCriteriaId": "ECF91FB7-2806-40C1-B27D-461B6836AC7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "4ECE8939-9AB8-44AB-8ECC-96844410A973"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "30853513-0CB0-4AD2-B351-635834EA5C40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "6EA983BC-02B6-4F2F-A80B-6505529F8690"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "520B32C2-8D7C-4C6B-8384-4AD5EE575492"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "32B73D72-C04F-4771-AC85-B6369A98685D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/vaadin/flow/pull/16935",
"source": "security@vaadin.com",
"tags": [
"Patch"
]
},
{
"url": "https://vaadin.com/security/cve-2023-25500",
"source": "security@vaadin.com",
"tags": [
"Vendor Advisory"
]
}
]
}