Описание
server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
Ссылки
- Vendor Advisory
- Third Party AdvisoryUS Government Resource
- Vendor Advisory
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:orientdb:orientdb:2.0.14:*:*:*:community:*:*:*
cpe:2.3:a:orientdb:orientdb:2.1.0:*:*:*:community:*:*:*
EPSS
Процентиль: 69%
0.00586
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-200
Связанные уязвимости
CVSS3: 5.9
github
больше 7 лет назад
OrientDB Server Community Edition uses insufficiently random values to generate session IDs
EPSS
Процентиль: 69%
0.00586
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-200