Airsonic
by Airsonic
Source repositories
CVEs (3)
| CVE | Vendor / Product | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|---|
| CVE-2019-10908 | 0.00 | — | 0.00 | Apr 7, 2019 | In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks. | |||
| CVE-2019-10907 | 0.00 | — | 0.00 | Apr 7, 2019 | Airsonic 10.2.1 uses Spring's default remember-me mechanism based on MD5, with a fixed key of airsonic in GlobalSecurityConfig.java. An attacker able to capture cookies might be able to trivially bruteforce offline the passwords of associated users. | |||
| CVE-2018-20222 | 0.00 | — | 0.00 | Apr 4, 2019 | XXE issue in Airsonic before 10.1.2 during parse. |
- CVE-2019-10908Apr 7, 2019risk 0.00cvss —epss 0.00
In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks.
- CVE-2019-10907Apr 7, 2019risk 0.00cvss —epss 0.00
Airsonic 10.2.1 uses Spring's default remember-me mechanism based on MD5, with a fixed key of airsonic in GlobalSecurityConfig.java. An attacker able to capture cookies might be able to trivially bruteforce offline the passwords of associated users.
- CVE-2018-20222Apr 4, 2019risk 0.00cvss —epss 0.00
XXE issue in Airsonic before 10.1.2 during parse.