Amon2::Auth::Site::LINE uses the String::Random module to generate nonce values. 

String::Random defaults to Perl's built-in predictable random number generator, the rand() function, which is not cryptographically secure
Advisories
Source ID Title
EUVD EUVD EUVD-2024-54367 Amon2::Auth::Site::LINE uses the String::Random module to generate nonce values.  String::Random defaults to Perl's built-in predictable random number generator, the rand() function, which is not cryptographically secure
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 08 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Nipotan
Nipotan line Integration For Amon2
CPEs cpe:2.3:a:nipotan:line_integration_for_amon2:*:*:*:*:*:*:*:*
Vendors & Products Nipotan
Nipotan line Integration For Amon2

Mon, 07 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 05 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Description Amon2::Auth::Site::LINE uses the String::Random module to generate nonce values.  String::Random defaults to Perl's built-in predictable random number generator, the rand() function, which is not cryptographically secure
Title Amon2::Auth::Site::LINE versions through 0.04 for Perl uses insecure rand() function for cryptographic functions
Weaknesses CWE-338
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2025-04-07T18:27:55.093Z

Reserved: 2025-03-26T14:00:56.466Z

Link: CVE-2024-57835

cve-icon Vulnrichment

Updated: 2025-04-07T14:33:59.292Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-05T16:15:32.143

Modified: 2025-04-08T16:48:07.570

Link: CVE-2024-57835

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.