Cryptographic Weakness Affecting mautic/core package, versions >=4.0.0-alpha1, <4.0.0<3.3.4


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.06% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cryptographic Weakness vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-MAUTICCORE-1577268
  • published31 Aug 2021
  • disclosed31 Aug 2021
  • creditMichael Rowley, Mohit Aghera

Introduced: 31 Aug 2021

CVE-2021-27913  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

Upgrade mautic/core to version 4.0.0, 3.3.4 or higher.

Overview

Affected versions of this package are vulnerable to Cryptographic Weakness. The function mt_rand is used to generate session tokens. This function is cryptographically flawed due to its nature being one pseudo-randomness. An attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under their control.

References

CVSS Scores

version 3.1