CVE-2019-25061

The random_password_generator (aka RandomPasswordGenerator) gem through 1.0.0 for Ruby uses Kernel#rand to generate passwords, which, due to its cyclic nature, can facilitate password prediction.
Configurations

Configuration 1 (hide)

cpe:2.3:a:random_password_generator_project:random_password_generator:*:*:*:*:*:ruby:*:*

History

21 Nov 2024, 04:39

Type Values Removed Values Added
References () https://github.com/bvsatyaram/random_password_generator/blob/2855e8d7d8803dbb580ddd6cf13846394eb4530e/lib/random_password_generator.rb#L23 - Third Party Advisory () https://github.com/bvsatyaram/random_password_generator/blob/2855e8d7d8803dbb580ddd6cf13846394eb4530e/lib/random_password_generator.rb#L23 - Third Party Advisory
References () https://github.com/bvsatyaram/random_password_generator/pull/1 - Issue Tracking, Third Party Advisory () https://github.com/bvsatyaram/random_password_generator/pull/1 - Issue Tracking, Third Party Advisory
References () https://ruby-doc.org/core-3.1.2/Random.html - Third Party Advisory () https://ruby-doc.org/core-3.1.2/Random.html - Third Party Advisory
References () https://stackoverflow.com/questions/42170239/security-of-rand-in-ruby-compared-to-other-methods/42170560 - Exploit, Third Party Advisory () https://stackoverflow.com/questions/42170239/security-of-rand-in-ruby-compared-to-other-methods/42170560 - Exploit, Third Party Advisory

Information

Published : 2022-05-18 11:15

Updated : 2024-11-21 04:39


NVD link : CVE-2019-25061

Mitre link : CVE-2019-25061

CVE.ORG link : CVE-2019-25061


JSON object : View

Products Affected

random_password_generator_project

  • random_password_generator
CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)