Description
Multiple classes used within Apereo CAS before release 6.1.0-RC5 makes use of apache commons-lang3 RandomStringUtils for token and ID generation which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong.
Remediation
References
https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467402
https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467404
https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467406
https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-468868
https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-468869
Related Vulnerabilities
CVE-2022-25907 Vulnerability in npm package ts-deepmerge
CVE-2021-21293 Vulnerability in maven package org.http4s:blaze-core_2.12
CVE-2023-28155 Vulnerability in maven package org.webjars:request
CVE-2013-6348 Vulnerability in maven package org.apache.struts:struts2-config-browser-plugin
CVE-2023-3308 Vulnerability in maven package com.whaleal.icefrog:icefrog-all