CVE-2019-10908

In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:airsonic_project:airsonic:10.2.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-04-07 14:29

Updated : 2023-12-10 12:59


NVD link : CVE-2019-10908

Mitre link : CVE-2019-10908

CVE.ORG link : CVE-2019-10908


JSON object : View

Products Affected

airsonic_project

  • airsonic
CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)