server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T05:32:20.367Z
Reserved: 2015-04-03T00:00:00
Link: CVE-2015-2913

No data.

Status : Modified
Published: 2015-12-31T05:59:09.470
Modified: 2024-11-21T02:28:18.503
Link: CVE-2015-2913

No data.