Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack
Low severity
GitHub Reviewed
Published
May 14, 2019
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
May 7, 2019
Reviewed
May 14, 2019
Published to the GitHub Advisory Database
May 14, 2019
Last updated
Feb 1, 2023
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.
References