Description
CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7716 | CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests. |
Github GHSA |
GHSA-q9qr-jwpw-3qvv | Golf may allow attacker to bypass CSRF protections due to weak PRNG |
References
History
Fri, 11 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-04-11T16:39:25.100Z
Reserved: 2022-07-29T18:33:03.456Z
Link: CVE-2016-15005
Updated: 2024-08-06T03:47:34.824Z
Status : Modified
Published: 2022-12-27T22:15:11.003
Modified: 2025-04-11T17:15:33.507
Link: CVE-2016-15005
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA