Vulnerabilities > CVE-2018-12520 - Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Ntop Ntopng 3.4

047910
CVSS 8.1 - HIGH
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
high complexity
ntop
CWE-335
exploit available

Summary

An issue was discovered in ntopng 3.4 before 3.4.180617. The PRNG involved in the generation of session IDs is not seeded at program startup. This results in deterministic session IDs being allocated for active user sessions. An attacker with foreknowledge of the operating system and standard library in use by the host running the service and the username of the user whose session they're targeting can abuse the deterministic random number generation in order to hijack the user's session, thus escalating their access.

Vulnerable Configurations

Part Description Count
Application
Ntop
1

Exploit-Db

descriptionntop-ng < 3.4.180617 - Authentication Bypass. CVE-2018-12520. Webapps exploit for Lua platform. Tags: Authentication Bypass / Credentials Bypass (AB/CB)
fileexploits/lua/webapps/44973.py
idEDB-ID:44973
last seen2018-07-03
modified2018-07-03
platformlua
port
published2018-07-03
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/44973/
titlentop-ng < 3.4.180617 - Authentication Bypass
typewebapps

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/148392/ntopng-bypass.txt
idPACKETSTORM:148392
last seen2018-07-03
published2018-07-02
reporterIoannis Profetis
sourcehttps://packetstormsecurity.com/files/148392/ntop-ng-Authentication-Bypass.html
titlentop-ng Authentication Bypass