CVE-2019-5440

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2019-5440
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-5440.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-5440
Published
2019-05-28T19:29:06Z
Modified
2024-09-03T02:53:52.806777Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Use of cryptographically weak PRNG in the password recovery token generation of Revive Adserver < v4.2.1 causes a potential authentication bypass attack if an attacker exploits the password recovery functionality. In lib/OA/Dal/PasswordRecovery.php, the function generateRecoveryId() generates a password reset token that relies on the PHP uniqid function and consequently depends only on the current server time, which is often visible in an HTTP Date header.

References

Affected packages

Git / github.com/revive-adserver/revive-adserver

Affected ranges

Type
GIT
Repo
https://github.com/revive-adserver/revive-adserver
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.0.5
v3.0.6
v3.1.0
v3.1.0-beta
v3.2.0
v3.2.0-beta
v3.2.1
v3.2.1-rc1
v3.2.3

v4.*

v4.0.0
v4.0.0-rc1
v4.0.1
v4.0.2
v4.1.0
v4.1.0-rc1
v4.1.2
v4.1.3
v4.1.4
v4.2.0
v4.2.0-rc1