Insecure Randomness Affecting io.ratpack:ratpack-session package, versions [,1.9.0)
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
0.05% (18th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-IORATPACK-1315139
- published 30 Jun 2021
- disclosed 30 Jun 2021
- credit Jonathan Leitschuh
Introduced: 30 Jun 2021
CVE-2021-29480 Open this link in a new tabHow to fix?
Upgrade io.ratpack:ratpack-session
to version 1.9.0 or higher.
Overview
io.ratpack:ratpack-session is a that allows supports for HTTP sessions within Ratpack applications.
Affected versions of this package are vulnerable to Insecure Randomness. The client-side session module by default uses the application startup time as the signing key. If an attacker can determine this time, and if encryption is not used (which is recommended but not implemented by default), the session data could be tampered with by someone with the ability to write cookies.