Security Flaw in Pulp Software's Password Generation Methodology
CVE-2016-3704
7.5HIGH
Summary
Pulp, a software platform for managing repositories, contains a vulnerability in its password generation mechanism. Versions prior to 2.8.5 utilize bash's $RANDOM variable in an insecure manner, potentially allowing attackers to predict generated passwords. This flaw may lead to unauthorized access to sensitive data and resources. It is vital for users to upgrade to the latest version to mitigate these risks and ensure robust security.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved