Insecure Randomness in CBOT's Chatbot (CVE-2023-2884)

CVE编号

CVE-2023-2884

利用情况

暂无

补丁情况

N/A

披露时间

2023-05-25
漏洞描述
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Use of Insufficiently Random Values vulnerability in CBOT Chatbot allows Signature Spoofing by Key Recreation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.


解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 cbot cbot_core * Up to
(excluding)
4.0.3.4
运行在以下环境
应用 cbot cbot_panel * Up to
(excluding)
4.0.3.7
运行在以下环境
系统 fedora_37 moby-engine * Up to
(excluding)
24.0.5-1.fc37
运行在以下环境
系统 fedora_38 moby-engine * Up to
(excluding)
24.0.5-1.fc38
运行在以下环境
系统 fedora_39 moby-engine * Up to
(excluding)
24.0.5-1.fc39
运行在以下环境
系统 kylinos_aarch64_V10 docker-engine * Up to
(excluding)
18.09.0-206.p07.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP1 docker-engine * Up to
(excluding)
18.09.0-101.p08.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 docker-engine * Up to
(excluding)
18.09.0-202.p06.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP3 docker-engine * Up to
(excluding)
18.09.0-206.p07.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP32309b docker-engine * Up to
(excluding)
18.09.0-206.p07.ky10
运行在以下环境
系统 kylinos_x86_64_V10 docker-engine * Up to
(excluding)
18.09.0-206.p07.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP1 docker-engine * Up to
(excluding)
18.09.0-101.p08.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 docker-engine * Up to
(excluding)
18.09.0-202.p06.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP3 docker-engine * Up to
(excluding)
18.09.0-206.p07.ky10
运行在以下环境
系统 opensuse_Leap_15.4 docker * Up to
(excluding)
24.0.5_ce-150000.185.1
运行在以下环境
系统 opensuse_Leap_15.5 docker * Up to
(excluding)
24.0.5_ce-150000.185.1
CVSS3评分
6.4
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-330 使用不充分的随机数
CWE-338 使用具有密码学弱点缺陷的PRNG
阿里云安全产品覆盖情况