Description
In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks.
Remediation
References
https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8
Related Vulnerabilities
CVE-2020-36649 Vulnerability in maven package org.webjars.bower:papaparse
CVE-2023-5245 Vulnerability in maven package ml.combust.bundle:bundle-ml_2.12
CVE-2021-21234 Vulnerability in maven package eu.hinsch:spring-boot-actuator-logview
CVE-2023-2972 Vulnerability in npm package @antfu/utils
CVE-2018-1000129 Vulnerability in maven package org.jolokia:jolokia-core