Description
server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
Remediation
References
https://www.kb.cert.org/vuls/id/845332
https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104
Related Vulnerabilities
CVE-2020-7622 Vulnerability in maven package io.jooby:jooby-netty
CVE-2017-12158 Vulnerability in maven package org.keycloak:keycloak-server-spi-private
CVE-2020-9447 Vulnerability in maven package com.googlecode.gwtupload:gwtupload-samples
CVE-2021-46365 Vulnerability in maven package info.magnolia:magnolia-core
CVE-2019-14653 Vulnerability in maven package org.webjars.npm:editor.md