5.0.5
10 years ago
13 days ago
Known vulnerabilities in the io.vertx:vertx-web package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
io.vertx:vertx-web is a HTTP web applications for Vert.x. Affected versions of this package are vulnerable to Files or Directories Accessible to External Parties via improper handling of hidden directories in the How to fix Files or Directories Accessible to External Parties? Upgrade | [,4.5.22)[5.0.0.CR1,5.0.5) |
io.vertx:vertx-web is a HTTP web applications for Vert.x. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Notes:
How to fix Cross-site Scripting (XSS)? Upgrade | [,4.5.22)[5.0.0.CR1,5.0.5) |
io.vertx:vertx-web is a HTTP web applications for Vert.x. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). Vert.x-Web framework does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack. How to fix Cross-site Request Forgery (CSRF)? Upgrade | [4.0.0-milestone1,4.0.0-milestone5) |