Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title OrientDB and Studio prior to version 2.1.1 contain multiple vulnerabilities
Name VU#845332 First vendor Publication 2015-09-03
Vendor VU-CERT Last vendor Modification 2015-09-03
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#845332

OrientDB and Studio prior to version 2.1.1 contain multiple vulnerabilities

Original Release date: 03 Sep 2015 | Last revised: 03 Sep 2015


Studio for OrientDB Server Community Edition version prior to version 2.1.1 contains several vulnerabilities.


CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2015-2912

The Studio web interface to OrientDB contains a CSRF vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request.

The version of Studio bundled with OrientDB Community Edition version 2.0.3 has been reported as vulnerable. Other versions prior to version 2.0.15 and 2.1.1 may also be vulnerable.

CWE-330: Use of Insufficiently Random Values - CVE-2015-2913

OrientDB prior to version 2.1.0 utilizes the Java library java.util.Random for Session IDs. However, this class is not random enough for security-related use. An attacker may be able to use this value to determine the internal state of the random number generator and predict future values.

CWE-20: Improper Input Validation - CVE-2015-2918

OrientDB Studio web management interface does not by default enforce the same-origin policy in X-Frame-Options response headers. An attacker can conduct clickjacking attacks via a crafted web page.


An unauthenticated remote attacker may perform actions with the same permissions of a victim user. An authenticated user may be able to gain administrative privileges to the database by manipulating the Session ID.


Apply an update

OrientDB has released versions 2.0.15 and 2.1.1 to address CVE-2015-2912 and CVE-2015-2913.

Affected users are encouraged to update as soon as possible.

The update addresses CVE-2015-2912 by disabling JSONP by default. Consider your threat model, mitigations, and needs before re-enabling this functionality.

CVE-2015-2913 is addressed by using java.security.SecureRandom to generate random numbers.

Set HTTP additional X-Frame-Options header

Setting the additional X-Frame-Options header prevents clickjacking attacks (CVE-2015-2918). To enable this, use the following command line argument when starting the server:

   -Dnetwork.http.additionalResponseHeaders="X-FRAME-OPTIONS: DENY"

or add this value to the server's orientdb-server-config.xml file.

Alternately, you may consider the following workarounds:

Disable OrientDB Studio

Consider disabling Studio if it is not required. Disabling Studio prevents these issues from being accessible.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Orient TechnologiesAffected10 Jun 201518 Aug 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)



  • https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104
  • https://github.com/orientechnologies/orientdb/issues/4824


Thanks to Raffaela Frank for reporting this vulnerability to us.

This document was written by Garret Wassermann.

Other Information

  • CVE IDs:CVE-2015-2912CVE-2015-2913CVE-2015-2918
  • Date Public:31 Aug 2015
  • Date First Published:03 Sep 2015
  • Date Last Updated:03 Sep 2015
  • Document Revision:48


If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/845332

CWE : Common Weakness Enumeration

% Id Name
33 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)
33 % CWE-200 Information Exposure
33 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

Application 2

Nessus® Vulnerability Scanner

Date Description
2015-10-08 Name : The version of OrientDB running on the remote host is affected by a cross-sit...
File : orientdb_2_0_15.nasl - Type : ACT_GATHER_INFO
2015-10-08 Name : The version of OrientDB running on the remote host uses weak session IDs.
File : orientdb_2_0_7.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2016-01-01 00:28:02
  • Multiple Updates
2015-12-31 09:27:34
  • Multiple Updates
2015-10-09 13:23:47
  • Multiple Updates
2015-09-04 00:29:23
  • Multiple Updates
2015-09-03 21:23:05
  • First insertion