The default session id generator returns a SHA-1 hash seeded with a counter, the epoch time, the built-in rand function, the PID, and internal Perl reference addresses. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.
Predicable session ids could allow an attacker to gain access to systems.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-30364 | Starch versions 0.14 and earlier generate session ids insecurely. The default session id generator returns a SHA-1 hash seeded with a counter, the epoch time, the built-in rand function, the PID, and internal Perl reference addresses. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems. |
Mon, 22 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 22 Sep 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Starch
Starch starch |
|
| Vendors & Products |
Starch
Starch starch |
Sat, 20 Sep 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Starch versions 0.14 and earlier generate session ids insecurely. The default session id generator returns a SHA-1 hash seeded with a counter, the epoch time, the built-in rand function, the PID, and internal Perl reference addresses. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems. | |
| Title | Starch versions 0.14 and earlier generate session ids insecurely | |
| Weaknesses | CWE-338 CWE-340 |
|
| References |
|
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2025-09-22T17:27:16.336Z
Reserved: 2025-04-16T09:05:34.362Z
Link: CVE-2025-40925
Updated: 2025-09-22T16:57:57.286Z
Status : Awaiting Analysis
Published: 2025-09-20T13:15:34.920
Modified: 2025-09-22T21:23:01.543
Link: CVE-2025-40925
No data.
OpenCVE Enrichment
Updated: 2025-09-22T09:58:51Z
EUVD