
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-4241 affects PHP Server Monitor and involves the use of a predictable algorithm in random number generator. The vulnerability was disclosed to the public and relates to the implementation of random number generation in the application (NVD).
The vulnerability stems from the use of mtrand() function instead of the more secure randombytes() function for generating random tokens. The issue was identified in the User.php file where mt_rand() was being used for generating remember me cookie tokens (GitHub). The CVSS v3.1 metrics indicate a Network attack vector with Low attack complexity and no privileges required for exploitation (NVD CNA Status).
The vulnerability could lead to potential compromise of user sessions through predictable token generation, affecting the confidentiality of user data with a Low impact rating while having no direct impact on system integrity or availability (NVD CNA Status).
The issue has been fixed by replacing mtrand() with randombytes() for generating random tokens. The patch implements a more cryptographically secure random number generation method (GitHub).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."