Description
server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0692 | server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class. |
Github GHSA |
GHSA-v6wr-fch2-vm5w | OrientDB Server Community Edition uses insufficiently random values to generate session IDs |
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T05:32:20.367Z
Reserved: 2015-04-03T00:00:00.000Z
Link: CVE-2015-2913
No data.
Status : Deferred
Published: 2015-12-31T05:59:09.470
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-2913
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA