Objectplanet Opinio version 7.22 and prior uses a cryptographically weak pseudo-random number generator (PRNG) coupled to a predictable seed, which could lead to an unauthenticated account takeover of any user on the application.
References
| Link | Resource |
|---|---|
| https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2024/MNDT-2024-0002.md | Third Party Advisory |
| https://www.objectplanet.com/opinio/changelog.html | Release Notes |
Configurations
History
09 Feb 2024, 19:49
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Objectplanet
Objectplanet opinio |
|
| CPE | cpe:2.3:a:objectplanet:opinio:*:*:*:*:*:*:*:* | |
| References | () https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2024/MNDT-2024-0002.md - Third Party Advisory | |
| References | () https://www.objectplanet.com/opinio/changelog.html - Release Notes | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| Summary |
|
01 Feb 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-01 22:15
Updated : 2024-02-09 19:49
NVD link : CVE-2023-4472
Mitre link : CVE-2023-4472
CVE.ORG link : CVE-2023-4472
JSON object : View
Products Affected
objectplanet
- opinio
CWE
CWE-335
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
