Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely.
Session ids are generated using an MD5 hash of the epoch time and a call to the built-in rand function. The epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.
Predicable session ids could allow an attacker to gain access to systems.
Metrics
Affected Vendors & Products
References
History
Wed, 17 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 17 Sep 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely. Session ids are generated using an MD5 hash of the epoch time and a call to the built-in rand function. The epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems. | |
Title | Apache::AuthAny::Cookie v0.201 or earlier for Perl generates session ids insecurely | |
Weaknesses | CWE-338 CWE-340 |
|
References |
|

Status: PUBLISHED
Assigner: CPANSec
Published: 2025-09-17T14:25:10.826Z
Updated: 2025-09-17T17:21:55.927Z
Reserved: 2025-04-16T09:05:34.363Z
Link: CVE-2025-40933

Updated: 2025-09-17T17:20:31.409Z

Status : Awaiting Analysis
Published: 2025-09-17T15:15:42.927
Modified: 2025-09-18T13:43:34.310
Link: CVE-2025-40933

No data.