Use of cryptographically weak PRNG in the password recovery token generation of Revive Adserver < v4.2.1 causes a potential authentication bypass attack if an attacker exploits the password recovery functionality. In lib/OA/Dal/PasswordRecovery.php, the function generateRecoveryId() generates a password reset token that relies on the PHP uniqid function and consequently depends only on the current server time, which is often visible in an HTTP Date header.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://hackerone.com/reports/576504 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: hackerone
Published: 2019-05-28T18:41:05
Updated: 2024-08-04T19:54:53.582Z
Reserved: 2019-01-04T00:00:00
Link: CVE-2019-5440
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-05-28T19:29:06.190
Modified: 2024-11-21T04:44:56.427
Link: CVE-2019-5440
Redhat
No data.