CVE-2019-10908

In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:airsonic_project:airsonic:10.2.1:*:*:*:*:*:*:*

History

21 Nov 2024, 04:20

Type Values Removed Values Added
References () https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8 - Patch, Third Party Advisory () https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8 - Patch, Third Party Advisory

Information

Published : 2019-04-07 14:29

Updated : 2024-11-21 04:20


NVD link : CVE-2019-10908

Mitre link : CVE-2019-10908

CVE.ORG link : CVE-2019-10908


JSON object : View

Products Affected

airsonic_project

  • airsonic
CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)