Amon2::Auth::Site::LINE uses the String::Random module to generate nonce values.
String::Random defaults to Perl's built-in predictable random number generator, the rand() function, which is not cryptographically secure
Metrics
Affected Vendors & Products
References
History
Tue, 08 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nipotan
Nipotan line Integration For Amon2 |
|
CPEs | cpe:2.3:a:nipotan:line_integration_for_amon2:*:*:*:*:*:*:*:* | |
Vendors & Products |
Nipotan
Nipotan line Integration For Amon2 |
Mon, 07 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Sat, 05 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Amon2::Auth::Site::LINE uses the String::Random module to generate nonce values. String::Random defaults to Perl's built-in predictable random number generator, the rand() function, which is not cryptographically secure | |
Title | Amon2::Auth::Site::LINE versions through 0.04 for Perl uses insecure rand() function for cryptographic functions | |
Weaknesses | CWE-338 | |
References |
|
|

Status: PUBLISHED
Assigner: CPANSec
Published: 2025-04-05T16:11:11.314Z
Updated: 2025-04-07T18:27:55.093Z
Reserved: 2025-03-26T14:00:56.466Z
Link: CVE-2024-57835

Updated: 2025-04-07T14:33:59.292Z

Status : Analyzed
Published: 2025-04-05T16:15:32.143
Modified: 2025-04-08T16:48:07.570
Link: CVE-2024-57835

No data.