Vulnerability Description
CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Golf Project | Golf | < 0.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fePatchThird Party Advisory
- https://github.com/dinever/golf/issues/20Issue TrackingThird Party Advisory
- https://github.com/dinever/golf/pull/24PatchThird Party Advisory
- https://pkg.go.dev/vuln/GO-2020-0045Third Party Advisory
- https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fePatchThird Party Advisory
- https://github.com/dinever/golf/issues/20Issue TrackingThird Party Advisory
- https://github.com/dinever/golf/pull/24PatchThird Party Advisory
- https://pkg.go.dev/vuln/GO-2020-0045Third Party Advisory
FAQ
What is CVE-2016-15005?
CVE-2016-15005 is a vulnerability with a CVSS score of 8.8 (HIGH). CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few reque...
How severe is CVE-2016-15005?
CVE-2016-15005 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-15005?
Check the references section above for vendor advisories and patch information. Affected products include: Golf Project Golf.