Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2021-27913 | First vendor Publication | 2021-08-30 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N | |||
---|---|---|---|
Overall CVSS Score | 3.5 | ||
Base Score | 3.5 | Environmental Score | 3.5 |
impact SubScore | 1.4 | Temporal Score | 3.5 |
Exploitabality Sub Score | 2.1 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | Low | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | Low |
Integrity Impact | None | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:S/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 3.5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 6.8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27913 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-338 | Use of Cryptographically Weak PRNG |
CPE : Common Platform Enumeration
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 13:54:48 |
|
2024-09-29 13:18:13 |
|
2024-09-28 02:23:26 |
|
2021-09-03 21:23:10 |
|
2021-08-31 00:22:51 |
|
2021-08-30 21:23:11 |
|