Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purposes in the OAuth flow to conduct OAuth replay attacks. In addition, insecure randomness is used while generating multifactor authentication (MFA) secrets and creating API keys in the database package.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0610 | Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purposes in the OAuth flow to conduct OAuth replay attacks. In addition, insecure randomness is used while generating multifactor authentication (MFA) secrets and creating API keys in the database package. |
Github GHSA |
GHSA-c7vf-m394-m4x4 | Use of Insufficiently Random Values in github.com/greenpau/caddy-security |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-05T13:47:17.512Z
Reserved: 2023-12-22T12:33:20.118Z
Link: CVE-2024-21495
Updated: 2024-08-01T22:20:40.898Z
Status : Awaiting Analysis
Published: 2024-02-17T05:15:09.343
Modified: 2024-11-21T08:54:33.127
Link: CVE-2024-21495
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:16:07Z
EUVD
Github GHSA