CVE-2015-2913

server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:orientdb:orientdb:2.0.14:*:*:*:community:*:*:*
cpe:2.3:a:orientdb:orientdb:2.1.0:*:*:*:community:*:*:*

History

21 Nov 2024, 02:28

Type Values Removed Values Added
References () https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104 - Vendor Advisory () https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104 - Vendor Advisory
References () https://www.kb.cert.org/vuls/id/845332 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/845332 - Third Party Advisory, US Government Resource

Information

Published : 2015-12-31 05:59

Updated : 2024-11-21 02:28


NVD link : CVE-2015-2913

Mitre link : CVE-2015-2913

CVE.ORG link : CVE-2015-2913


JSON object : View

Products Affected

orientdb

  • orientdb
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor