Vulnerability Details : CVE-2018-12540
In version from 3.0.0 to 3.5.2 of Eclipse Vert.x, the CSRFHandler do not assert that the XSRF Cookie matches the returned XSRF header/form parameter. This allows replay attacks with previously issued tokens which are not expired yet.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2018-12540
- cpe:2.3:a:eclipse:vert.x:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-12540
2.69%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-12540
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2018-12540
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by:
- emo@eclipse.org (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2018-12540
-
https://access.redhat.com/errata/RHSA-2018:2371
RHSA-2018:2371 - Security Advisory - Red Hat Customer PortalExploit;Third Party Advisory
-
https://lists.apache.org/thread.html/r59482ebed302aa49ac7e0c51737499746b0d086fcdeb8f90e705951f@%3Ccommits.pulsar.apache.org%3E
[GitHub] [pulsar] klwilson227 opened a new issue #7931: CVE-2018-12540 pulsar use of io.vertx-web.jar vertx 3.4.1 - Pony Mail
-
https://lists.apache.org/thread.html/r10aef585c521f8ef603f5831f9d97a27d920624025131da950e0c62f@%3Ccommits.pulsar.apache.org%3E
Pony Mail!
-
https://bugs.eclipse.org/bugs/show_bug.cgi?id=536948
536948 – (CVE-2018-12540) CVE request for Eclipse Vert.x (CSRF validation is incomplete)Exploit;Vendor Advisory
-
https://lists.apache.org/thread.html/r3fffda8e947edaa359152c8dc4c4ea9c96fd8ced1999bbce92bc6b25@%3Ccommits.pulsar.apache.org%3E
Pony Mail!
-
https://lists.apache.org/thread.html/rc5b4ae8a7caae6d3d5b3266cb050823b96dd62b30718b90b778d3d8b@%3Ccommits.pulsar.apache.org%3E
Pony Mail!
Jump to