CVE-2018-12520

An issue was discovered in ntopng 3.4 before 3.4.180617. The PRNG involved in the generation of session IDs is not seeded at program startup. This results in deterministic session IDs being allocated for active user sessions. An attacker with foreknowledge of the operating system and standard library in use by the host running the service and the username of the user whose session they're targeting can abuse the deterministic random number generation in order to hijack the user's session, thus escalating their access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ntop:ntopng:*:*:*:*:*:*:*:*

History

10 Feb 2024, 03:01

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2018/Jul/14 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2018/Jul/14 - Exploit, Mailing List, Third Party Advisory
References () https://gist.github.com/Psychotropos/3e8c047cada9b1fb716e6a014a428b7f - Third Party Advisory () https://gist.github.com/Psychotropos/3e8c047cada9b1fb716e6a014a428b7f - Exploit
References () https://github.com/ntop/ntopng/commit/30610bda60cbfc058f90a1c0a17d0e8f4516221a - Patch, Third Party Advisory () https://github.com/ntop/ntopng/commit/30610bda60cbfc058f90a1c0a17d0e8f4516221a - Patch

Information

Published : 2018-07-05 20:29

Updated : 2024-02-10 03:01


NVD link : CVE-2018-12520

Mitre link : CVE-2018-12520

CVE.ORG link : CVE-2018-12520


JSON object : View

Products Affected

ntop

  • ntopng
CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)