CVE-2016-15005

CVSS V2 None CVSS V3 None
Description
CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests.
Overview
  • CVE ID
  • CVE-2016-15005
  • Assigner
  • security@golang.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2022-12-27T22:15:11
  • Last Modified Date
  • 2023-02-28T18:15:09
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:golf_project:golf:*:*:*:*:*:go:*:* 1 OR 0.3.0
History
Created Old Value New Value Data Type Notes
2022-12-27 23:14:47 Added to TrackCVE
2022-12-28 12:14:45 2022-12-28T10:18:56 CVE Modified Date updated
2022-12-28 12:14:45 Received Awaiting Analysis Vulnerability Status updated
2023-01-04 16:17:12 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-06 18:21:54 2023-01-06T16:21:29 CVE Modified Date updated
2023-01-06 18:21:54 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-06 18:21:55 Weakness Enumeration new
2023-01-06 18:21:55 CPE Information updated
2023-02-28 20:13:44 2023-02-28T18:15:09 CVE Modified Date updated
2023-02-28 20:13:44 Analyzed Modified Vulnerability Status updated
2023-02-28 20:13:44 CSRF tokens are generated using math/rand, which is not a cryptographically secure rander number generation, making predicting their values relatively trivial and allowing an attacker to bypass CSRF protections which relatively few requests. CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests. Description updated