Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely.

Session ids are generated using an MD5 hash of the epoch time and a call to the built-in rand function. The epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.

Predicable session ids could allow an attacker to gain access to systems.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 17 Sep 2025 14:30:00 +0000

Type Values Removed Values Added
Description Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely. Session ids are generated using an MD5 hash of the epoch time and a call to the built-in rand function. The epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Title Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely
Weaknesses CWE-338
CWE-340
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2025-09-17T14:25:10.826Z

Reserved: 2025-04-16T09:05:34.363Z

Link: CVE-2025-40933

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-17T15:15:42.927

Modified: 2025-09-17T15:15:42.927

Link: CVE-2025-40933

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.