CVE-2021-27913

The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0.
References
Link Resource
https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3 Exploit Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:4.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:4.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:4.0.0:rc:*:*:*:*:*:*

History

03 Sep 2021, 16:43

Type Values Removed Values Added
CPE cpe:2.3:a:acquia:mautic:4.0.0:rc:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:4.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:4.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
CWE CWE-338
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 3.5
References (CONFIRM) https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3 - (CONFIRM) https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3 - Exploit, Patch, Third Party Advisory

30 Aug 2021, 18:15

Type Values Removed Values Added
Summary The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0. The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0.

30 Aug 2021, 16:25

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-30 16:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-27913

Mitre link : CVE-2021-27913

CVE.ORG link : CVE-2021-27913


JSON object : View

Products Affected

acquia

  • mautic
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

CWE-327

Use of a Broken or Risky Cryptographic Algorithm