Airsonic 10.2.1 uses Spring's default remember-me mechanism based on MD5, with a fixed key of airsonic in GlobalSecurityConfig.java. An attacker able to capture cookies might be able to trivially bruteforce offline the passwords of associated users.
References
Link | Resource |
---|---|
https://github.com/airsonic/airsonic/commit/3e07ea52885f88d3fbec444dfd592f27bfb65647 | Patch Third Party Advisory |
https://github.com/airsonic/airsonic/commit/3e07ea52885f88d3fbec444dfd592f27bfb65647 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/airsonic/airsonic/commit/3e07ea52885f88d3fbec444dfd592f27bfb65647 - Patch, Third Party Advisory |
Information
Published : 2019-04-07 14:29
Updated : 2024-11-21 04:20
NVD link : CVE-2019-10907
Mitre link : CVE-2019-10907
CVE.ORG link : CVE-2019-10907
JSON object : View
Products Affected
airsonic_project
- airsonic
CWE
CWE-326
Inadequate Encryption Strength