Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks.
{ "nvd_published_at": "2007-02-07T11:28:00Z", "cwe_ids": [ "CWE-330" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-02-12T16:20:55Z" }