First published: Thu Sep 18 2008(Updated: )
Joomla! 1.5 before 1.5.7 initializes PHP's PRNG with a weak seed, which makes it easier for attackers to guess the pseudo-random values produced by PHP's mt_rand function, as demonstrated by guessing password reset tokens, a different vulnerability than CVE-2008-3681.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | =1.5 | |
Joomla | =1.5.1 | |
Joomla | =1.5.2 | |
Joomla | =1.5.3 | |
Joomla | =1.5.4 | |
Joomla | =1.5.5 | |
Joomla | =1.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4102 is classified as a medium severity vulnerability due to its potential to allow attackers to predict the output of PHP's mt_rand function.
To fix CVE-2008-4102, it is recommended to upgrade Joomla! to version 1.5.7 or later, where the issue is resolved.
CVE-2008-4102 affects Joomla! versions 1.5 through 1.5.6.
CVE-2008-4102 can compromise the security of user accounts by allowing attackers to easily guess password reset tokens.
While CVE-2008-4102 is not considered critical, it poses a significant risk to user account security and should be addressed promptly.