Description
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0451 | Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs. |
Github GHSA |
GHSA-54mg-vgrp-mwx9 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:03:32.877Z
Reserved: 2019-05-07T00:00:00.000Z
Link: CVE-2019-11808
No data.
Status : Modified
Published: 2019-05-07T07:29:05.167
Modified: 2024-11-21T04:21:48.180
Link: CVE-2019-11808
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA