Amon2::Auth::Site::LINE uses the String::Random module to generate nonce values.
String::Random defaults to Perl's built-in predictable random number generator, the rand() function, which is not cryptographically secure
References
Configurations
History
08 Apr 2025, 16:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Nipotan
Nipotan line Integration For Amon2 |
|
CPE | cpe:2.3:a:nipotan:line_integration_for_amon2:*:*:*:*:*:*:*:* | |
References | () https://metacpan.org/release/SHLOMIF/String-Random-0.32/source/lib/String/Random.pm#L377 - Product | |
References | () https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L235 - Product | |
References | () https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L255 - Product | |
References | () https://security.metacpan.org/docs/guides/random-data-for-security.html - Technical Description |
07 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
07 Apr 2025, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-05 16:15
Updated : 2025-04-08 16:48
NVD link : CVE-2024-57835
Mitre link : CVE-2024-57835
CVE.ORG link : CVE-2024-57835
JSON object : View
Products Affected
nipotan
- line_integration_for_amon2
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)