CVE-2024-58036

Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:norbu09:net\:\:dropbox\:\:api:*:*:*:*:*:perl:*:*

History

10 Apr 2025, 16:27

Type Values Removed Values Added
First Time Norbu09
Norbu09 net\
CPE cpe:2.3:a:norbu09:net\:\:dropbox\:\:api:*:*:*:*:*:perl:*:*
References () https://metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pm#L537 - () https://metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pm#L537 - Product
References () https://metacpan.org/release/NORBU/Net-Dropbox-API-1.9/source/lib/Net/Dropbox/API.pm#L11 - () https://metacpan.org/release/NORBU/Net-Dropbox-API-1.9/source/lib/Net/Dropbox/API.pm#L11 - Product
References () https://metacpan.org/release/NORBU/Net-Dropbox-API-1.9/source/lib/Net/Dropbox/API.pm#L385 - () https://metacpan.org/release/NORBU/Net-Dropbox-API-1.9/source/lib/Net/Dropbox/API.pm#L385 - Product
References () https://perldoc.perl.org/functions/rand - () https://perldoc.perl.org/functions/rand - Product
References () https://security.metacpan.org/docs/guides/random-data-for-security.html - () https://security.metacpan.org/docs/guides/random-data-for-security.html - Product

07 Apr 2025, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

07 Apr 2025, 14:17

Type Values Removed Values Added
Summary
  • (es) Net::Dropbox::API 1.9 y versiones anteriores para Perl utilizan la función rand() como fuente predeterminada de entropía, la cual no es criptográficamente segura para las funciones criptográficas. En concreto, Net::Dropbox::API utiliza la librería Data::Random, que indica específicamente que es útil principalmente para programas de prueba. Data::Random utiliza la función rand().

05 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-05 16:15

Updated : 2025-04-10 16:27


NVD link : CVE-2024-58036

Mitre link : CVE-2024-58036

CVE.ORG link : CVE-2024-58036


JSON object : View

Products Affected

norbu09

  • net\
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)