CVE-2021-27913
30.08.2021, 16:15
The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0.
Vendor | Product | Version |
---|---|---|
acquia | mautic | 𝑥 < 3.3.4 |
acquia | mautic | 4.0.0:alpha1 |
acquia | mautic | 4.0.0:beta |
acquia | mautic | 4.0.0:rc |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-327 - Use of a Broken or Risky Cryptographic AlgorithmThe use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
- CWE-338 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.