Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4355 | Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks. |
Github GHSA |
GHSA-jg2x-r643-w2ch | Jetty Uses Predictable Session Identifiers |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T20:50:04.543Z
Reserved: 2007-02-07T00:00:00
Link: CVE-2006-6969
No data.
Status : Deferred
Published: 2007-02-07T11:28:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-6969
OpenCVE Enrichment
No data.
EUVD
Github GHSA