Description
Multiple classes used within Apereo CAS before release 6.1.0-RC5 makes use of apache commons-lang3 RandomStringUtils for token and ID generation which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong.
Remediation
References
https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467402
https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467404
https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-467406
https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-468868
https://snyk.io/vuln/SNYK-JAVA-ORGAPEREOCAS-468869
Related Vulnerabilities
CVE-2018-16487 Vulnerability in npm package lodash._basemerge
CVE-2021-23362 Vulnerability in npm package hosted-git-info
CVE-2020-8116 Vulnerability in maven package org.webjars.npm:dot-prop
CVE-2020-6858 Vulnerability in maven package com.hotels.styx:styx-api
CVE-2018-20677 Vulnerability in maven package org.webjars.bower:bootstrap