Insecure Randomness Affecting io.ratpack:ratpack-session package, versions [,1.9.0)


0.0
medium

Snyk CVSS

    Attack Complexity Low

    Threat Intelligence

    EPSS 0.05% (18th percentile)
Expand this section
NVD
3.1 low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-IORATPACK-1315139
  • published 30 Jun 2021
  • disclosed 30 Jun 2021
  • credit Jonathan Leitschuh

How to fix?

Upgrade io.ratpack:ratpack-session to version 1.9.0 or higher.

Overview

io.ratpack:ratpack-session is a that allows supports for HTTP sessions within Ratpack applications.

Affected versions of this package are vulnerable to Insecure Randomness. The client-side session module by default uses the application startup time as the signing key. If an attacker can determine this time, and if encryption is not used (which is recommended but not implemented by default), the session data could be tampered with by someone with the ability to write cookies.