Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
References
Configurations
History
10 Apr 2025, 16:27
Type | Values Removed | Values Added |
---|---|---|
First Time |
Norbu09
Norbu09 net\ |
|
CPE | cpe:2.3:a:norbu09:net\:\:dropbox\:\:api:*:*:*:*:*:perl:*:* | |
References | () https://metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pm#L537 - Product | |
References | () https://metacpan.org/release/NORBU/Net-Dropbox-API-1.9/source/lib/Net/Dropbox/API.pm#L11 - Product | |
References | () https://metacpan.org/release/NORBU/Net-Dropbox-API-1.9/source/lib/Net/Dropbox/API.pm#L385 - Product | |
References | () https://perldoc.perl.org/functions/rand - Product | |
References | () https://security.metacpan.org/docs/guides/random-data-for-security.html - Product |
07 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
07 Apr 2025, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-05 16:15
Updated : 2025-04-10 16:27
NVD link : CVE-2024-58036
Mitre link : CVE-2024-58036
CVE.ORG link : CVE-2024-58036
JSON object : View
Products Affected
norbu09
- net\
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)