server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
References
Link | Resource |
---|---|
https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104 | Vendor Advisory |
https://www.kb.cert.org/vuls/id/845332 | Third Party Advisory US Government Resource |
https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104 | Vendor Advisory |
https://www.kb.cert.org/vuls/id/845332 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104 - Vendor Advisory | |
References | () https://www.kb.cert.org/vuls/id/845332 - Third Party Advisory, US Government Resource |
Information
Published : 2015-12-31 05:59
Updated : 2024-11-21 02:28
NVD link : CVE-2015-2913
Mitre link : CVE-2015-2913
CVE.ORG link : CVE-2015-2913
JSON object : View
Products Affected
orientdb
- orientdb
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor