Lucene search

K
githubGitHub Advisory DatabaseGHSA-JG2X-R643-W2CH
HistoryMay 01, 2022 - 7:43 a.m.

Jetty Uses Predictable Session Identifiers

2022-05-0107:43:29
CWE-330
GitHub Advisory Database
github.com
2

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.4 High

AI Score

Confidence

Low

0.142 Low

EPSS

Percentile

95.7%

Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks.

Affected configurations

Vulners
Node
org.eclipse.jetty\jettyMatchserver
OR
org.eclipse.jetty\jettyMatchserver
OR
org.eclipse.jetty\jettyMatchserver
OR
org.eclipse.jetty\jettyMatchserver

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.4 High

AI Score

Confidence

Low

0.142 Low

EPSS

Percentile

95.7%

Related for GHSA-JG2X-R643-W2CH