server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0692 | server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class. |
Github GHSA |
GHSA-v6wr-fch2-vm5w | OrientDB Server Community Edition uses insufficiently random values to generate session IDs |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T05:32:20.367Z
Reserved: 2015-04-03T00:00:00
Link: CVE-2015-2913
No data.
Status : Deferred
Published: 2015-12-31T05:59:09.470
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-2913
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA