Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely.
Session ids are generated using an MD5 hash of the epoch time and a call to the built-in rand function. The epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.
Predicable session ids could allow an attacker to gain access to systems.
Session ids are generated using an MD5 hash of the epoch time and a call to the built-in rand function. The epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.
Predicable session ids could allow an attacker to gain access to systems.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 17 Sep 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely. Session ids are generated using an MD5 hash of the epoch time and a call to the built-in rand function. The epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems. | |
Title | Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely | |
Weaknesses | CWE-338 CWE-340 |
|
References |
|

Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2025-09-17T14:25:10.826Z
Reserved: 2025-04-16T09:05:34.363Z
Link: CVE-2025-40933

No data.

Status : Received
Published: 2025-09-17T15:15:42.927
Modified: 2025-09-17T15:15:42.927
Link: CVE-2025-40933

No data.

No data.