Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CVE-2019-10754
Summary
Multiple classes used within Apereo CAS before version 5.3.12.1, 6.0.x before 6.0.5.1 and 6.1.x up to 6.1.0-RC5 makes use of apache commons-lang3 RandomStringUtils for token and ID generation which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- LOW
- HIGH
- NONE
CWE-338 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.
References
Advisory Timeline
- Published