Miggo Logo

CVE-2025-24783: Apache Cocoon vulnerable to Incorrect Usage of Seeds in Pseudo-Random Number Generator

N/A

CVSS Score

Basic Information

EPSS Score
0.38045%
Published
1/27/2025
Updated
1/27/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.cocoon:cocoon-forms-implmaven<= 2.3.0
org.apache.cocoon:cocoon-sitemap-implmaven<= 2.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

Both functions improperly initialize SecureRandom with the system's startup time (System.currentTimeMillis()) rather than using proper entropy sources. This violates CWE-335 as predictable seeds lead to predictable outputs. The CaptchaField's static initializer affects CAPTCHA generation security, while ContinuationsManagerImpl's constructor impacts continuation ID randomness. The evidence from code links shows direct seeding with timestamp, and the vulnerability description explicitly calls out this pattern as the root cause for predictable continuation IDs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In*orr**t Us*** o* S***s in Ps*u*o-R*n*om Num**r **n*r*tor (PRN*) vuln*r**ility in *p**** *o*oon. T*is issu* *****ts *p**** *o*oon: *ll v*rsions. W**n * *ontinu*tion is *r**t**, it **ts * r*n*om i**nti*i*r. ****us* t** r*n*om num**r **n*r*tor us**

Reasoning

*ot* *un*tions improp*rly initi*liz* S**ur*R*n*om wit* t** syst*m's st*rtup tim* (Syst*m.*urr*ntTim*Millis()) r*t**r t**n usin* prop*r *ntropy sour**s. T*is viol*t*s *W*-*** *s pr**i*t**l* s***s l*** to pr**i*t**l* outputs. T** **pt****i*l*'s st*ti*