Lucene search

K
nvd[email protected]NVD:CVE-2021-27913
HistoryAug 30, 2021 - 4:15 p.m.

CVE-2021-27913

2021-08-3016:15:07
CWE-338
CWE-327
web.nvd.nist.gov
1
mt_rand function
mautic
enumeration
session tokens
cryptographically flawed

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

24.8%

The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0.

Affected configurations

Nvd
Node
acquiamauticRange<3.3.4
OR
acquiamauticMatch4.0.0alpha1
OR
acquiamauticMatch4.0.0beta
OR
acquiamauticMatch4.0.0rc
VendorProductVersionCPE
acquiamautic*cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
acquiamautic4.0.0cpe:2.3:a:acquia:mautic:4.0.0:alpha1:*:*:*:*:*:*
acquiamautic4.0.0cpe:2.3:a:acquia:mautic:4.0.0:beta:*:*:*:*:*:*
acquiamautic4.0.0cpe:2.3:a:acquia:mautic:4.0.0:rc:*:*:*:*:*:*

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

24.8%