We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-57835

Amon2::Auth::Site::LINE versions through 0.04 for Perl uses insecure rand() function for cryptographic functions



Description

Amon2::Auth::Site::LINE uses the String::Random module to generate nonce values.  String::Random defaults to Perl's built-in predictable random number generator, the rand() function, which is not cryptographically secure

Reserved 2025-03-26 | Published 2025-04-05 | Updated 2025-04-07 | Assigner CPANSec

Problem types

CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Product status

Default status
unaffected

Any version
affected

References

metacpan.org/...ring-Random-0.32/source/lib/String/Random.pm related

metacpan.org/...LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm related

metacpan.org/...LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm related

security.metacpan.org/...uides/random-data-for-security.html related

cve.org (CVE-2024-57835)

nvd.nist.gov (CVE-2024-57835)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-57835

Support options

Helpdesk Chat, Email, Knowledgebase