CVE-2019-10908 (NVD)

2019-04-07

In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks.

Products Airsonic
Type Cryptographic Issues (CWE-310)
First patch - None (likely due to unavailable code)
Patches https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8