Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.sakaiproject.kernel/sakai-kernel-impl
  4. ›
  5. GHSA-gr7h-xw4f-wh86

GHSA-gr7h-xw4f-wh86: Sakai kernel-impl: predictable PRNG used to generate server‑side encryption key in EncryptionUtilityServiceImpl

October 22, 2025

EncryptionUtilityServiceImpl initialized an AES256TextEncryptor password (serverSecretKey) using RandomStringUtils with the default java.util.Random. java.util.Random is a non‑cryptographic PRNG and can be predicted from limited state/seed information (e.g., start time window), substantially reducing the effective search space of the generated key. An attacker who can obtain ciphertexts (e.g., exported or at‑rest strings protected by this service) and approximate the PRNG seed can feasibly reconstruct the serverSecretKey and decrypt affected data.

References

  • github.com/advisories/GHSA-gr7h-xw4f-wh86
  • github.com/sakaiproject/sakai
  • github.com/sakaiproject/sakai/security/advisories/GHSA-gr7h-xw4f-wh86

Code Behaviors & Features

Detect and mitigate GHSA-gr7h-xw4f-wh86 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 23.3

Solution

Unfortunately, there is no solution available yet.

Impact 2.6 LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-337: Predictable Seed in Pseudo-Random Number Generator (PRNG)

Source file

maven/org.sakaiproject.kernel/sakai-kernel-impl/GHSA-gr7h-xw4f-wh86.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 05 Dec 2025 12:20:59 +0000.