First published: Mon Sep 17 2012(Updated: )
SilverStripe 2.3.x before 2.3.10 and 2.4.x before 2.4.4 uses weak entropy when generating tokens for (1) the CSRF protection mechanism, (2) autologin, (3) "forgot password" functionality, and (4) password salts, which makes it easier for remote attackers to bypass intended access restrictions via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Silverstripe silverstripe | =2.3.4 | |
Silverstripe silverstripe | =2.3.7 | |
Silverstripe silverstripe | =2.3.3 | |
Silverstripe silverstripe | =2.3.8 | |
Silverstripe silverstripe | =2.3.1 | |
Silverstripe silverstripe | =2.3.5 | |
Silverstripe silverstripe | =2.3.9 | |
Silverstripe silverstripe | =2.3.6 | |
Silverstripe silverstripe | =2.3.0 | |
Silverstripe silverstripe | =2.3.2 | |
Silverstripe silverstripe | =2.4.1 | |
Silverstripe silverstripe | =2.4.0 | |
Silverstripe silverstripe | =2.4.2 | |
Silverstripe silverstripe | =2.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.