First published: Tue May 28 2019(Updated: )
Use of cryptographically weak PRNG in the password recovery token generation of Revive Adserver < v4.2.1 causes a potential authentication bypass attack if an attacker exploits the password recovery functionality. In lib/OA/Dal/PasswordRecovery.php, the function generateRecoveryId() generates a password reset token that relies on the PHP uniqid function and consequently depends only on the current server time, which is often visible in an HTTP Date header.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Revive-adserver Revive Adserver | <4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-5440.
The severity of CVE-2019-5440 is high, with a severity value of 8.1.
Revive Adserver version up to exclusive 4.2.1 is affected by CVE-2019-5440.
CVE-2019-5440 could allow an attacker to bypass authentication if they exploit the password recovery functionality.
Yes, you can find more information about CVE-2019-5440 at the following link: https://hackerone.com/reports/576504