Description
In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks.
Remediation
References
https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8
Related Vulnerabilities
CVE-2023-46657 Vulnerability in maven package org.jenkins-ci.plugins:gogs-webhook
CVE-2021-27515 Vulnerability in maven package org.webjars.bowergithub.unshiftio:url-parse
CVE-2020-28424 Vulnerability in npm package s3-kilatstorage
CVE-2022-41946 Vulnerability in maven package org.postgresql:postgresql
CVE-2023-29519 Vulnerability in maven package org.xwiki.platform:xwiki-platform-attachment-ui