Описание
Insecure randomness in socket.io
Affected versions of socket.io depend on Math.random() to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization.
Recommendation
Update to v0.9.7 or later.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-16031
- https://github.com/socketio/socket.io/issues/856
- https://github.com/socketio/socket.io/pull/857
- https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8
- https://github.com/advisories/GHSA-qv2v-m59f-v5fw
- https://www.npmjs.com/advisories/321
Пакеты
Наименование
socket.io
npm
Затронутые версииВерсия исправления
<= 0.9.6
0.9.7
Связанные уязвимости
CVSS3: 7.5
nvd
больше 7 лет назад
Socket.io is a realtime application framework that provides communication via websockets. Because socket.io 0.9.6 and earlier depends on `Math.random()` to create socket IDs, the IDs are predictable. An attacker is able to guess the socket ID and gain access to socket.io servers, potentially obtaining sensitive information.