Use of Insufficiently Random Values in Apereo CAS
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jan 30, 2023
Package
Affected versions
< 6.1.0-RC5
Patched versions
6.1.0-RC5
Description
Published by the National Vulnerability Database
Sep 23, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Nov 1, 2022
Last updated
Jan 30, 2023
Multiple classes used within Apereo CAS before release 6.1.0-RC5 makes use of apache commons-lang3 RandomStringUtils for token and ID generation which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong.
References