Описание
Multiple classes used within Apereo CAS before release 6.1.0-RC5 makes use of apache commons-lang3 RandomStringUtils for token and ID generation which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong.
Ссылки
- ExploitPatchThird Party Advisory
- ExploitPatchThird Party Advisory
- ExploitPatchThird Party Advisory
- ExploitPatchThird Party Advisory
- ExploitPatchThird Party Advisory
- ExploitPatchThird Party Advisory
- ExploitPatchThird Party Advisory
- ExploitPatchThird Party Advisory
- ExploitPatchThird Party Advisory
- ExploitPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.0.5.1 (включая)
Одно из
cpe:2.3:a:apereo:central_authentication_service:*:*:*:*:*:*:*:*
cpe:2.3:a:apereo:central_authentication_service:6.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:apereo:central_authentication_service:6.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:apereo:central_authentication_service:6.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:apereo:central_authentication_service:6.1.0:rc4:*:*:*:*:*:*
EPSS
Процентиль: 60%
0.004
Низкий
8.1 High
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-338
Связанные уязвимости
CVSS3: 8.1
github
больше 3 лет назад
Use of Insufficiently Random Values in Apereo CAS
EPSS
Процентиль: 60%
0.004
Низкий
8.1 High
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-338