CVE-2020-36319:
Potential sensitive data exposure in applications using Vaadin 15
3.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.6494%
CWE
Published
4/19/2021
Updated
1/29/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.vaadin:flow-server | maven | >= 3.0.0, < 3.0.6 | 3.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from Vaadin's flow-server modifying Spring's default ObjectMapper configuration to include non-public fields. The key evidence comes from: 1) The CVE description explicitly mentions insecure ObjectMapper configuration 2) The fix in PR #8016 shows they stopped modifying Spring's default ObjectMapper and created a separate qualified instance 3) The security advisory states the patched version uses a separate ObjectMapper instance. The objectMapper method in VaadinConnectControllerConfiguration was the entry point where this insecure configuration occurred before the patch.