Insecure Randomness Affecting io.ratpack:ratpack-session Open this link in a new tab package, versions [,1.9.0)
Attack Complexity
Low
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-IORATPACK-1315139
-
published
30 Jun 2021
-
disclosed
30 Jun 2021
-
credit
Jonathan Leitschuh
Introduced: 30 Jun 2021
CVE-2021-29480 Open this link in a new tabHow to fix?
Upgrade io.ratpack:ratpack-session
to version 1.9.0 or higher.
Overview
io.ratpack:ratpack-session is a that allows supports for HTTP sessions within Ratpack applications.
Affected versions of this package are vulnerable to Insecure Randomness. The client-side session module by default uses the application startup time as the signing key. If an attacker can determine this time, and if encryption is not used (which is recommended but not implemented by default), the session data could be tampered with by someone with the ability to write cookies.