CVE-2023-25500

Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:beta3:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:rc2:*:*:*:*:*:*

History

21 Nov 2024, 07:49

Type Values Removed Values Added
References () https://github.com/vaadin/flow/pull/16935 - Patch () https://github.com/vaadin/flow/pull/16935 - Patch
References () https://vaadin.com/security/cve-2023-25500 - Vendor Advisory () https://vaadin.com/security/cve-2023-25500 - Vendor Advisory
CVSS v2 : unknown
v3 : 4.3
v2 : unknown
v3 : 3.5

30 Jun 2023, 16:32

Type Values Removed Values Added
CPE cpe:2.3:a:vaadin:vaadin:24.1.0:beta3:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:vaadin:vaadin:24.1.0:alpha3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
First Time Vaadin vaadin
Vaadin
CWE CWE-200
References (MISC) https://github.com/vaadin/flow/pull/16935 - (MISC) https://github.com/vaadin/flow/pull/16935 - Patch
References (MISC) https://vaadin.com/security/cve-2023-25500 - (MISC) https://vaadin.com/security/cve-2023-25500 - Vendor Advisory

22 Jun 2023, 14:49

Type Values Removed Values Added
References
  • (MISC) https://vaadin.com/security/cve-2023-25500 -
Summary Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in a potential information disclosure of class and method names in RPC responses by sending modified requests. Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests.

22 Jun 2023, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-22 13:15

Updated : 2024-11-21 07:49


NVD link : CVE-2023-25500

Mitre link : CVE-2023-25500

CVE.ORG link : CVE-2023-25500


JSON object : View

Products Affected

vaadin

  • vaadin
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor