Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T17:02:06.925Z
Reserved: 2020-12-13T00:00:00
Link: CVE-2020-35217

No data.

Status : Modified
Published: 2021-01-20T13:15:12.440
Modified: 2024-11-21T05:27:02.353
Link: CVE-2020-35217
