In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This is fixed in version 9.4.6.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-w7q8-58qp-vmpf | Technical Description |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/ | Mailing List Third Party Advisory |
Information
Published : 2020-05-05 15:15
Updated : 2021-10-26 13:01
NVD link : CVE-2020-11035
Mitre link : CVE-2020-11035
JSON object : View
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Products Affected
glpi-project
- glpi
fedoraproject
- fedora