CVE-2024-56370

Net::Xero 0.044 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Xero uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
Configurations

No configuration.

History

14 Apr 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

07 Apr 2025, 14:17

Type Values Removed Values Added
Summary
  • (es) Net::Xero 0.044 y versiones anteriores para Perl utilizan la función rand() como fuente predeterminada de entropía, la cual no es criptográficamente segura para funciones criptográficas. En concreto, Net::Xero utiliza la librería Data::Random, que indica específicamente que es útil principalmente para programas de prueba. Data::Random utiliza la función rand().

05 Apr 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-05 19:15

Updated : 2025-04-14 18:15


NVD link : CVE-2024-56370

Mitre link : CVE-2024-56370

CVE.ORG link : CVE-2024-56370


JSON object : View

Products Affected

No product.

CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)