In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks.
References
Link | Resource |
---|---|
https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8 | Patch Third Party Advisory |
https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8 - Patch, Third Party Advisory |
Information
Published : 2019-04-07 14:29
Updated : 2024-11-21 04:20
NVD link : CVE-2019-10908
Mitre link : CVE-2019-10908
CVE.ORG link : CVE-2019-10908
JSON object : View
Products Affected
airsonic_project
- airsonic
CWE
CWE-335
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)