Description
The SAML identifier generated within SAML2Utils.java was found to make use of the apache commons-lang3 RandomStringUtils class which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. This issue only affects the 3.X release of pac4j-saml.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0762 | The SAML identifier generated within SAML2Utils.java was found to make use of the apache commons-lang3 RandomStringUtils class which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. This issue only affects the 3.X release of pac4j-saml. |
Github GHSA |
GHSA-rc75-cf5c-mxvh | Use of Cryptographically Weak Pseudo-Random Number Generator in org.pac4j:pac4j-saml |
References
| Link | Providers |
|---|---|
| https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407 |
|
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T22:32:01.535Z
Reserved: 2019-04-03T00:00:00.000Z
Link: CVE-2019-10755
No data.
Status : Modified
Published: 2019-09-23T23:15:10.737
Modified: 2024-11-21T04:19:51.530
Link: CVE-2019-10755
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA