Overview
This vulnerability was reported by harpsiford
Source link for the reported vulnerabilities are as follows:
https://huntr.com/bounties/604b0ff1-860a-4027-82ef-d12a187233e9/
How to Identify Similar vulnerabilities
This is something which is used by many people, from a security prespective you want a token which serves as an integrity of an action to be random and not guessable. Often time, programmatically there exists multiple classes that can generate random numbers or string. Problem with functions/methods like this is that they are not truly random and hence does not provide a good entropy for generating the tokens. In order to tackle this, many new implementations of PRNG algorithms has been done where they make use of
seed
specified by the developer to generate random numbers.
Use of RandomStringUtils
Package for Generating Tokens
RandomStringUtils
Package for Generating TokensIn the alovoa
application relies on RandomStringUtils.randomAlphaNumeric
to generate a token for performing user account based operations such as registration, deletion and password reset.
(User Delete Action)[https://github.com/Alovoa/alovoa/blob/ace5c183a790b45a00cc437f563a8a34a5599783/src/main/java/com/nonononoki/alovoa/service/UserService.java]
Same logic exists for generating password reset tokens as well:
There is a public POC which takes a deep dive into the implementation of RandomStringUtils.randomAlphanumeric
and reverse engineer the algorithm to predict past and future genrated numbers.
Patch
The developers made patch to the vulnerable code by using the java.security.SecureRandom
as the PRNG for generating the random string, here they have provided SecureRandom
method for source of randomness. Reference for RandomStringUtils
How to Identify Similar vulnerabilities
It is very important to look into the functions that has been obsolete and possess considerable security concerns such as the one we discussed.
Last updated
Was this helpful?