Description
Multiple classes used within Apereo CAS before release 6.1.0-RC5 makes use of apache commons-lang3 RandomStringUtils for token and ID generation which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3859 | Multiple classes used within Apereo CAS before release 6.1.0-RC5 makes use of apache commons-lang3 RandomStringUtils for token and ID generation which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. |
Github GHSA |
GHSA-g24w-373r-5pxg | Use of Insufficiently Random Values in Apereo CAS |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T22:32:01.987Z
Reserved: 2019-04-03T00:00:00.000Z
Link: CVE-2019-10754
No data.
Status : Modified
Published: 2019-09-23T23:15:10.640
Modified: 2024-11-21T04:19:51.393
Link: CVE-2019-10754
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA