Insecure Randomness Affecting io.ratpack:ratpack-session Open this link in a new tab package, versions [,1.9.0)


0.0
medium
  • Attack Complexity

    Low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-IORATPACK-1315139

  • published

    30 Jun 2021

  • disclosed

    30 Jun 2021

  • credit

    Jonathan Leitschuh

How to fix?

Upgrade io.ratpack:ratpack-session to version 1.9.0 or higher.

Overview

io.ratpack:ratpack-session is a that allows supports for HTTP sessions within Ratpack applications.

Affected versions of this package are vulnerable to Insecure Randomness. The client-side session module by default uses the application startup time as the signing key. If an attacker can determine this time, and if encryption is not used (which is recommended but not implemented by default), the session data could be tampered with by someone with the ability to write cookies.