In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks.
References
Link | Resource |
---|---|
https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8 | Patch Third Party Advisory |
Configurations
Information
Published : 2019-04-07 07:29
Updated : 2021-07-21 04:39
NVD link : CVE-2019-10908
Mitre link : CVE-2019-10908
JSON object : View
CWE
CWE-335
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
Products Affected
airsonic_project
- airsonic