In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This is fixed in version 9.4.6.
References
Configurations
History
26 Oct 2021, 20:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/ - Mailing List, Third Party Advisory |
Information
Published : 2020-05-05 22:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-11035
Mitre link : CVE-2020-11035
CVE.ORG link : CVE-2020-11035
JSON object : View
Products Affected
fedoraproject
- fedora
glpi-project
- glpi
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm