CVE-2023-4472

Objectplanet Opinio version 7.22 and prior uses a cryptographically weak pseudo-random number generator (PRNG) coupled to a predictable seed, which could lead to an unauthenticated account takeover of any user on the application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:objectplanet:opinio:*:*:*:*:*:*:*:*

History

09 Feb 2024, 19:49

Type Values Removed Values Added
CPE cpe:2.3:a:objectplanet:opinio:*:*:*:*:*:*:*:*
Summary
  • (es) Objectplanet Opinio versión 7.22 y anteriores utiliza un generador de números pseudoaleatorios (PRNG) criptográficamente débil acoplado a una semilla predecible, lo que podría conducir a una apropiación no autenticada de la cuenta de cualquier usuario de la aplicación.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Objectplanet
Objectplanet opinio
References () https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2024/MNDT-2024-0002.md - () https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2024/MNDT-2024-0002.md - Third Party Advisory
References () https://www.objectplanet.com/opinio/changelog.html - () https://www.objectplanet.com/opinio/changelog.html - Release Notes

01 Feb 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-01 22:15

Updated : 2024-02-09 19:49


NVD link : CVE-2023-4472

Mitre link : CVE-2023-4472

CVE.ORG link : CVE-2023-4472


JSON object : View

Products Affected

objectplanet

  • opinio
CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)