Use of a Broken or Risky Cryptographic Algorithm in livehelperchat/livehelperchat
Reported on
Oct 1st 2021
Description
livehelperchat
uses cryptographically insecure functions (microtime
, mt_rand()
and even rand
) to generate sensitive information.
Proof of Concept
None provided, see the PHP documentation that specifies the cryptographic insecurity of the above functions.
Impact
This vulnerability is capable of allowing an attacker to deduce previously-generated (and future) passwords.
Occurrences
erlhcoreclassmodelforgotpassword.php L35
$str = substr(md5($str . microtime() . rand(1, 10000000)), 0, $lenght);
erlhcoreclassmodelforgotpassword.php L32
for ($i = 0; $i<$lenght; $i++) {
$str .= substr($allchar, mt_rand(0, 36), 1);
}
erlhcoreclassmodelforgotpassword.php L29
mt_srand(( double) microtime() * 1000000);