Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets. When creating a default app with the "mojo generate app" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.
History

Thu, 08 May 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 May 2025 19:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Sat, 03 May 2025 10:30:00 +0000

Type Values Removed Values Added
Description Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets. When creating a default app with the "mojo generate app" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.
Title Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets
Weaknesses CWE-338
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published: 2025-05-03T10:16:10.636Z

Updated: 2025-05-07T19:06:35.967Z

Reserved: 2025-04-07T16:06:37.226Z

Link: CVE-2024-58135

cve-icon Vulnrichment

Updated: 2025-05-05T18:16:35.505Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-03T11:15:48.037

Modified: 2025-05-07T19:16:06.447

Link: CVE-2024-58135

cve-icon Redhat

No data.