com.vaadin:flow-server@6.0.4 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the com.vaadin:flow-server package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Debug Messages Revealing Unnecessary Information

Affected versions of this package are vulnerable to Debug Messages Revealing Unnecessary Information in rpc/PublishedServerEventHandlerRpcHandler.java. Class and method names can be included in RPC responses when processing modified requests.

How to fix Debug Messages Revealing Unnecessary Information?

Upgrade com.vaadin:flow-server to version 1.0.21, 2.9.3, 9.1.2, 23.3.13, 24.0.9, 24.1.0 or higher.

[1.0.0,1.0.21) [1.1.0,2.9.3) [3.0.0,9.1.2) [23.0.0,23.3.13) [24.0.0,24.0.9) [24.1.0.alpha1,24.1.0)
  • M
Information Exposure

Affected versions of this package are vulnerable to Information Exposure when adding non-visible components to the UI in the server side.

How to fix Information Exposure?

Upgrade com.vaadin:flow-server to version 1.0.20, 2.8.10, 9.1.1, 23.3.11, 24.0.8, 24.1.0 or higher.

[1.0.0,1.0.20) [1.1.0,2.8.10) [3.0.0,9.1.1) [23.0.0,23.3.11) [24.0.0,24.0.8) [24.1.0.alpha1,24.1.0)
  • L
Cross-site Scripting (XSS)

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). URL encoding error in development mode handler allows local user to execute arbitrary JavaScript code by opening crafted URL in browser.

How to fix Cross-site Scripting (XSS)?

Upgrade com.vaadin:flow-server to version 2.6.2, 6.0.10 or higher.

[2.0.0,2.6.2) [3.0.0,6.0.10)
  • M
Denial of Service (DoS)

Affected versions of this package are vulnerable to Denial of Service (DoS). Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for NotFoundException is provided.

How to fix Denial of Service (DoS)?

Upgrade com.vaadin:flow-server to version 1.0.15, 2.6.2, 6.0.10 or higher.

[1.0.0,1.0.15) [1.1.0,2.6.2) [3.0.0,6.0.10)
  • M
Insecure Permissions

Affected versions of this package are vulnerable to Insecure Permissions. Insecure temporary directory usage in frontend build functionality allows local users to inject malicious code into frontend resources during application rebuilds.

How to fix Insecure Permissions?

Upgrade com.vaadin:flow-server to version 6.0.6, 2.5.3 or higher.

[3.0.0,6.0.6) [2.0.9,2.5.3)
  • M
Access Restriction Bypass

Affected versions of this package are vulnerable to Access Restriction Bypass. Authentication.logout() helper uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.

How to fix Access Restriction Bypass?

Upgrade com.vaadin:flow-server to version 6.0.5 or higher.

[5.0.0,6.0.5)