Miggo Logo

CVE-2022-29567: Possible information disclosure inside TreeGrid component with default data provider

5.7

CVSS Score
3.1

Basic Information

EPSS Score
0.38521%
Published
5/25/2022
Updated
5/15/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.vaadin:vaadinmaven>= 14.8.5, < 14.8.1014.8.10
com.vaadin:vaadinmaven>= 22.0.6, < 22.0.1522.0.15
com.vaadin:vaadinmaven>= 23.0.0, < 23.0.923.0.9
com.vaadin:vaadin-grid-flowmaven>= 14.8.5, < 14.8.1014.8.10
com.vaadin:vaadin-grid-flowmaven>= 22.0.6, < 22.0.1522.0.15
com.vaadin:vaadin-grid-flowmaven>= 23.0.0.beta2, < 23.0.923.0.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from using Object::toString() as the default key provider in TreeGrid's data communication. The GitHub PR #3046 shows the fix replaced this with numeric IDs, explicitly addressing the toString() exposure. The affected methods are core data provider initialization points in TreeGrid.java, where the default key provider would be set unless explicitly overridden. The high confidence comes from direct evidence in commit messages and the patching strategy focused on these methods.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### **s*ription T** ****ult *on*i*ur*tion o* * Tr***ri* *ompon*nt us*s O*j**t::toStrin* *s * k*y on t** *li*nt-si** *n* s*rv*r *ommuni**tion in V***in **.*.* t*rou** **.*.*, **.*.* t*rou** **.*.**, **.*.*.**t** t*rou** **.*.* *n* **.*.*.*lp*** t*rou

Reasoning

T** vuln*r**ility st*ms *rom usin* `O*j**t::toStrin*()` *s t** ****ult k*y provi**r in Tr***ri*'s **t* *ommuni**tion. T** *it*u* PR #**** s*ows t** *ix r*pl**** t*is wit* num*ri* I*s, *xpli*itly ***r*ssin* t** `toStrin*()` *xposur*. T** *****t** m*t*