Airsonic 10.2.1 uses Spring's default remember-me mechanism based on MD5, with a fixed key of airsonic in GlobalSecurityConfig.java. An attacker able to capture cookies might be able to trivially bruteforce offline the passwords of associated users.
[
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"303704105775196217024279013170664490936",
"2446681687777448089538238093434030719",
"42111404749834803587671574570883347907",
"133585551283528248972958941242053989813",
"154264793489246672321098524434749498489",
"312957750971785111436900567639562862859",
"215139526197560750367736025129617611661",
"286302168458483881366205302442985315582",
"329546977764431779538205964297571993469",
"109976895431288495263302100766870175155"
],
"threshold": 0.9
},
"source": "https://github.com/airsonic/airsonic/commit/3e07ea52885f88d3fbec444dfd592f27bfb65647",
"target": {
"file": "airsonic-main/src/main/java/org/airsonic/player/security/GlobalSecurityConfig.java"
},
"id": "CVE-2019-10907-913e7320"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1780.0,
"function_hash": "225445002587459582225339103306879177313"
},
"source": "https://github.com/airsonic/airsonic/commit/3e07ea52885f88d3fbec444dfd592f27bfb65647",
"target": {
"file": "airsonic-main/src/main/java/org/airsonic/player/security/GlobalSecurityConfig.java",
"function": "configure"
},
"id": "CVE-2019-10907-fe5f8b46"
}
]