ID CVE-2010-5079
Summary SilverStripe 2.3.x before 2.3.10 and 2.4.x before 2.4.4 uses weak entropy when generating tokens for (1) the CSRF protection mechanism, (2) autologin, (3) "forgot password" functionality, and (4) password salts, which makes it easier for remote attackers to bypass intended access restrictions via unspecified vectors.
References
Vulnerable Configurations
  • cpe:2.3:a:silverstripe:silverstripe:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:silverstripe:silverstripe:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:silverstripe:silverstripe:2.4.3:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-09-2012 - 04:00)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
confirm
mlist
  • [oss-security] 20110104 CVE request: silverstripe before 2.4.4
  • [oss-security] 20120430 CVE-request: SilverStripe before 2.4.4
  • [oss-security] 20120430 Re: CVE-request: SilverStripe before 2.4.4
  • [oss-security] 20120501 Re: CVE-request: SilverStripe before 2.4.4
Last major update 18-09-2012 - 04:00
Published 17-09-2012 - 17:55
Last modified 18-09-2012 - 04:00
Back to Top