CVE-2021-44151
Severity CVSS v4.0:
Pending analysis
Type:
CWE-330
Use of Insufficiently Random Value
Publication date:
13/12/2021
Last modified:
30/04/2025
Description
An issue was discovered in Reprise RLM 14.2. As the session cookies are small, an attacker can hijack any existing sessions by bruteforcing the 4 hex-character session cookie on the Windows version (the Linux version appears to have 8 characters). An attacker can obtain the static part of the cookie (cookie name) by first making a request to any page on the application (e.g., /goforms/menu) and saving the name of the cookie sent with the response. The attacker can then use the name of the cookie and try to request that same page, setting a random value for the cookie. If any user has an active session, the page should return with the authorized content, when a valid cookie value is hit.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:reprisesoftware:reprise_license_manager:*:*:*:*:*:*:*:* | 14.2 (including) | 15.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/165191/Reprise-License-Manager-14.2-Session-Hijacking.html
- https://reprisesoftware.com/admin/rlm-admin-download.php?euagree=yes
- https://www.reprisesoftware.com/RELEASE_NOTES
- http://packetstormsecurity.com/files/165191/Reprise-License-Manager-14.2-Session-Hijacking.html
- https://reprisesoftware.com/admin/rlm-admin-download.php?euagree=yes
- https://www.reprisesoftware.com/RELEASE_NOTES



