Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely.

Session ids are generated using an MD5 hash of the epoch time and a call to the built-in rand function. The epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.

Predicable session ids could allow an attacker to gain access to systems.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-29729 Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely. Session ids are generated using an MD5 hash of the epoch time and a call to the built-in rand function. The epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 17 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 17 Sep 2025 14:30:00 +0000

Type Values Removed Values Added
Description Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely. Session ids are generated using an MD5 hash of the epoch time and a call to the built-in rand function. The epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Title Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely
Weaknesses CWE-338
CWE-340
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2025-09-17T17:21:55.927Z

Reserved: 2025-04-16T09:05:34.363Z

Link: CVE-2025-40933

cve-icon Vulnrichment

Updated: 2025-09-17T17:20:31.409Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-17T15:15:42.927

Modified: 2025-09-18T13:43:34.310

Link: CVE-2025-40933

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.