CVE-2021-33605:
Unauthorized property update in CheckboxGroup component in Vaadin 12-14 and 15-20
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.45939%
CWE
Published
8/30/2021
Updated
5/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.vaadin:vaadin-checkbox-flow | maven | >= 12.0.0, < 14.6.8 | 14.6.8 |
com.vaadin:vaadin-checkbox-flow | maven | >= 15.0.0, < 20.0.6 | 20.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the hasValidValue()
method's validation logic. The pre-patch version (vulnerable) used: 'selectedItems.stream().allMatch(itemEnabledProvider)', which only ensured currently selected items are enabled. The patched version introduces comparison between old and new values for disabled items. This indicates the vulnerability existed in the original validation logic that failed to properly check if disabled items' values were being modified - a classic CWE-754 scenario of missing exceptional condition checks for disabled components.