In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks.
References
Link | Resource |
---|---|
https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-04-07T13:32:58
Updated: 2019-04-07T13:32:58
Reserved: 2019-04-07T00:00:00
Link: CVE-2019-10908
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-04-07T14:29:00.427
Modified: 2021-07-21T11:39:23.747
Link: CVE-2019-10908
JSON object: View
Redhat Information
No data.
CWE