The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0.
References
Link | Resource |
---|---|
https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3 | Exploit Patch Third Party Advisory |
https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3 | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3 - Exploit, Patch, Third Party Advisory |
Information
Published : 2021-08-30 16:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27913
Mitre link : CVE-2021-27913
CVE.ORG link : CVE-2021-27913
JSON object : View
Products Affected
acquia
- mautic