Vulnerability Details : CVE-2021-27913
The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0.
Products affected by CVE-2021-27913
- cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
- cpe:2.3:a:acquia:mautic:4.0.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:acquia:mautic:4.0.0:beta:*:*:*:*:*:*
- cpe:2.3:a:acquia:mautic:4.0.0:rc:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-27913
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-27913
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:P/I:N/A:N |
6.8
|
2.9
|
NIST | |
3.5
|
LOW | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
2.1
|
1.4
|
NIST | |
3.5
|
LOW | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L |
2.1
|
1.4
|
Mautic |
CWE ids for CVE-2021-27913
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by: security@mautic.org (Secondary)
-
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-27913
-
https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3
Use of a Broken or Risky Cryptographic Algorithm · Advisory · mautic/mautic · GitHubExploit;Patch;Third Party Advisory
Jump to