Overview
- Description
- server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
- Source
- cret@cert.org
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:orientdb:orientdb:2.0.14:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "6D3EEB60-F819-4F15-962C-06DDA45896E9" }, { "criteria": "cpe:2.3:a:orientdb:orientdb:2.1.0:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "C913E0D2-2E28-4BB6-957C-9832193C3FB4" } ], "operator": "OR" } ] } ]