WebService::Xero 0.11 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Specifically WebService::Xero uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
References
Configurations
History
10 Apr 2025, 16:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:localshop:webservice\:\:xero:*:*:*:*:*:perl:*:* | |
First Time |
Localshop webservice\
Localshop |
|
References | () https://metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pm#L537 - Product | |
References | () https://metacpan.org/release/LOCALSHOP/WebService-Xero-0.11/source/lib/WebService/Xero/Agent.pm#L17 - Product | |
References | () https://metacpan.org/release/LOCALSHOP/WebService-Xero-0.11/source/lib/WebService/Xero/Agent.pm#L178 - Product | |
References | () https://metacpan.org/release/LOCALSHOP/WebService-Xero-0.11/source/lib/WebService/Xero/Agent/PublicApplication.pm#L13 - Product | |
References | () https://metacpan.org/release/LOCALSHOP/WebService-Xero-0.11/source/lib/WebService/Xero/Agent/PublicApplication.pm#L93 - Product | |
References | () https://perldoc.perl.org/functions/rand - Product | |
References | () https://security.metacpan.org/docs/guides/random-data-for-security.html - Product |
07 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
07 Apr 2025, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Apr 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-05 17:15
Updated : 2025-04-10 16:13
NVD link : CVE-2024-52322
Mitre link : CVE-2024-52322
CVE.ORG link : CVE-2024-52322
JSON object : View
Products Affected
localshop
- webservice\
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)