cvelist/2021/27xxx/CVE-2021-27913.json
2021-08-30 16:00:59 +00:00

100 lines
3.4 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security@mautic.org",
"DATE_PUBLIC": "2021-08-30T14:06:00.000Z",
"ID": "CVE-2021-27913",
"STATE": "PUBLIC",
"TITLE": "Use of a Broken or Risky Cryptographic Algorithm"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mautic",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "3.3.4"
},
{
"version_affected": "<",
"version_value": "4.0.0"
}
]
}
}
]
},
"vendor_name": "Mautic"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Reported by Michael Rowley https://github.com/michaellrowley, Fixed by Mohit Aghera https://github.com/mohit-rocks"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-327 Use of a Broken or Risky Cryptographic Algorithm"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3",
"name": "https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3"
}
]
},
"source": {
"defect": [
"MST-18"
],
"discovery": "EXTERNAL"
}
}