Web::API 2.8 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Specifically Web::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
References
Configurations
History
09 Apr 2025, 16:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:lev:web\:\:api:*:*:*:*:*:perl:*:* | |
First Time |
Lev web\
Lev |
|
References | () https://metacpan.org/dist/Web-API/source/lib/Web/API.pm#L20 - Product | |
References | () https://metacpan.org/dist/Web-API/source/lib/Web/API.pm#L348 - Product | |
References | () https://metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pm#L537 - Product | |
References | () https://perldoc.perl.org/functions/rand - Product | |
References | () https://security.metacpan.org/docs/guides/random-data-for-security.html - Product |
07 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
07 Apr 2025, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-05 16:15
Updated : 2025-04-09 16:10
NVD link : CVE-2024-57868
Mitre link : CVE-2024-57868
CVE.ORG link : CVE-2024-57868
JSON object : View
Products Affected
lev
- web\
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)