Use of cryptographically weak PRNG in the password recovery token generation of Revive Adserver < v4.2.1 causes a potential authentication bypass attack if an attacker exploits the password recovery functionality. In lib/OA/Dal/PasswordRecovery.php, the function generateRecoveryId() generates a password reset token that relies on the PHP uniqid function and consequently depends only on the current server time, which is often visible in an HTTP Date header.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2019-15028 | Use of cryptographically weak PRNG in the password recovery token generation of Revive Adserver < v4.2.1 causes a potential authentication bypass attack if an attacker exploits the password recovery functionality. In lib/OA/Dal/PasswordRecovery.php, the function generateRecoveryId() generates a password reset token that relies on the PHP uniqid function and consequently depends only on the current server time, which is often visible in an HTTP Date header. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://hackerone.com/reports/576504 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-04T19:54:53.582Z
Reserved: 2019-01-04T00:00:00
Link: CVE-2019-5440

No data.

Status : Modified
Published: 2019-05-28T19:29:06.190
Modified: 2024-11-21T04:44:56.427
Link: CVE-2019-5440

No data.

No data.