CVE-2025-7783

Brute Force
 

Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
https://nvd.nist.gov/vuln/detail/CVE-2025-7783

Categories

CWE-330 : Use of Insufficiently Random Values
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers. Consider a PRNG that re-seeds itself as needed from high quality pseudo-random output sources, such as hardware devices. Use automated static analysis tools that target this type of weakness. Many modern techniques use data flow analysis to minimize the number of false positives. This is not a perfect solution, since 100% accuracy and coverage are not feasible. Use products or modules that conform to FIPS 140-2 [REF-267] to avoid obvious entropy problems. Consult FIPS 140-2 Annex C ("Approved Random Number Generators"). Use tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules. PHP framework uses mt_rand() function (Marsenne Twister) when generating tokens Cloud application on Kubernetes generates passwords using a weak random number generator based on deployment time. Crypto product uses rand() library function to generate a recovery key, making it easier to conduct brute force attacks. Random number generator can repeatedly generate the same value. Web application generates predictable session IDs, allowing session hijacking. Password recovery utility generates a relatively small number of random passwords, simplifying brute force attacks. Cryptographic key created with a seed based on the system time. Kernel function does not have a good entropy source just after boot. Blogging software uses a hard-coded salt when calculating a password hash. Bulletin board application uses insufficiently random names for uploaded files, allowing other users to access private files. Handheld device uses predictable TCP sequence numbers, allowing spoofing or hijacking of TCP connections. Web management console generates session IDs based on the login time, making it easier to conduct session hijacking. SSL library uses a weak random number generator that only generates 65,536 unique keys. Chain: insufficient precision causes extra zero bits to be assigned, reducing entropy for an API function that generates random numbers. Chain: insufficient precision (CWE-1339) inrandom-number generator causes some zero bits to be reliablygenerated, reducing the amount of entropy (CWE-331) CAPTCHA implementation does not produce enough different images, allowing bypass using a database of all possible checksums. DNS client uses predictable DNS transaction IDs, allowing DNS spoofing. Application generates passwords that are based on the time of day.

References


 

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
112 Brute Force
High
485 Signature Spoofing by Key Recreation
High
59 Session Credential Falsification through Prediction
High


MITRE


Techniques

id description
T1110 Brute Force
T1552.004 Unsecured Credentials: Private Keys
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1018 Proactively reset accounts that are known to be part of breached credentials either immediately, or after detecting bruteforce attempts.
M1022 Ensure permissions are properly set on folders containing sensitive private keys to prevent unintended access. Additionally, on Cisco devices, set the `nonexportable` flag during RSA key pair generation.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.