Missing output sanitization in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL
{ "vanir_signatures": [ { "id": "CVE-2019-25027-724dc12d", "source": "https://github.com/vaadin/flow/commit/96ebe74d7819acea6bf720ad39af1d12132a8956", "deprecated": false, "signature_type": "Line", "target": { "file": "flow-server/src/main/java/com/vaadin/flow/component/UI.java" }, "signature_version": "v1", "digest": { "line_hashes": [ "261953307091429512020813919124974003204", "329533054537719354414092760958815002704", "313930173888583270381484067923183456160", "162146791431649347363597301744334728147", "242797645317436500196535946665471567281", "286910172304206219900340701977937062437", "278181443505157423786147500441283476047", "303837510556439872409158675732397683248", "153768064545624599271116704130548139556", "109483147727043905708274744426371902544", "259870548858588817648333372768790484811", "325017224019585151779266844960186116358", "106226419683089484003885099097620599339", "329760685973920828001511732786776132401", "158446089771610535504004077417513645932", "278220728157201837614615789759340673763", "124408381347879013080958365972561941930", "154785131295333403489954052243911469192", "135046169291699858826297569535737011561" ], "threshold": 0.9 } } ] }