Description
Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purposes in the OAuth flow to conduct OAuth replay attacks. In addition, insecure randomness is used while generating multifactor authentication (MFA) secrets and creating API keys in the database package.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0610 | Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purposes in the OAuth flow to conduct OAuth replay attacks. In addition, insecure randomness is used while generating multifactor authentication (MFA) secrets and creating API keys in the database package. |
Github GHSA |
GHSA-c7vf-m394-m4x4 | Use of Insufficiently Random Values in github.com/greenpau/caddy-security |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-05T13:47:17.512Z
Reserved: 2023-12-22T12:33:20.118Z
Link: CVE-2024-21495
Updated: 2024-08-01T22:20:40.898Z
Status : Awaiting Analysis
Published: 2024-02-17T05:15:09.343
Modified: 2024-11-21T08:54:33.127
Link: CVE-2024-21495
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:16:07Z
Weaknesses
EUVD
Github GHSA