#VU31081 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack - CVE-2019-11808
Published: May 7, 2019 / Updated: July 17, 2020
Ratpack
Ratpack
Description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.