CVE-2019-5440 Vulnerability Details

  /     /     /  

CVE-2019-5440 Metadata Quick Info

CVE Published: 28/05/2019 | CVE Updated: 04/08/2024 | CVE Year: 2019
Source: hackerone | Vendor: Revive | Product: Revive Adserver
Status : PUBLISHED

CVE-2019-5440 Description

Use of cryptographically weak PRNG in the password recovery token generation of Revive Adserver < v4.2.1 causes a potential authentication bypass attack if an attacker exploits the password recovery functionality. In lib/OA/Dal/PasswordRecovery.php, the function generateRecoveryId() generates a password reset token that relies on the PHP uniqid function and consequently depends only on the current server time, which is often visible in an HTTP Date header.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-338
CWE Name: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (CWE-338)
Source: Revive

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).