Specifically Net::Xero uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54365 | Net::Xero 0.044 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Xero uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 05 Sep 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-331 |
Mon, 14 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sat, 05 Apr 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Net::Xero 0.044 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Xero uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function. | |
| Title | Net::Xero 0.044 and earlier for Perl uses insecure rand() function for cryptographic functions | |
| Weaknesses | CWE-338 | |
| References |
|
|
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2025-09-05T13:18:38.369Z
Reserved: 2025-03-26T14:00:56.418Z
Link: CVE-2024-56370
Updated: 2025-04-14T17:45:11.026Z
Status : Awaiting Analysis
Published: 2025-04-05T19:15:38.857
Modified: 2025-09-05T14:15:41.277
Link: CVE-2024-56370
No data.
OpenCVE Enrichment
No data.
EUVD