Lucene search

K
osvGoogleOSV:GHSA-54MG-VGRP-MWX9
HistoryMay 14, 2019 - 4:01 a.m.

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack

2019-05-1404:01:37
Google
osv.dev
5

0.001 Low

EPSS

Percentile

49.5%

Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK’s ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.

0.001 Low

EPSS

Percentile

49.5%

Related for OSV:GHSA-54MG-VGRP-MWX9