mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
94 lines
3.5 KiB
JSON
94 lines
3.5 KiB
JSON
{
|
|
"id": "CVE-2024-58135",
|
|
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
|
|
"published": "2025-05-03T11:15:48.037",
|
|
"lastModified": "2025-05-12T19:15:48.663",
|
|
"vulnStatus": "Undergoing Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Mojolicious versions from 7.28 through 9.40 for Perl may generate weak HMAC session secrets.\n\nWhen creating a default app with the \"mojo generate app\" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Las versiones de Mojolicious de la 7.28 a la 9.39 para Perl pueden generar secretos de sesi\u00f3n HMAC d\u00e9biles. Al crear una aplicaci\u00f3n predeterminada con la herramienta \"mojo generate app\", se escribe un secreto d\u00e9bil en el archivo de configuraci\u00f3n de la aplicaci\u00f3n mediante la funci\u00f3n insegura rand(), que se utiliza para autenticar y proteger la integridad de las sesiones de la aplicaci\u00f3n. Esto podr\u00eda permitir a un atacante acceder por fuerza bruta a las claves de sesi\u00f3n de la aplicaci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-338"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-338"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/hashcat/hashcat/pull/4090",
|
|
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
|
},
|
|
{
|
|
"url": "https://github.com/mojolicious/mojo/pull/2200",
|
|
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
|
},
|
|
{
|
|
"url": "https://metacpan.org/release/SRI/Mojolicious-7.28/source/lib/Mojolicious/Command/generate/app.pm#L220",
|
|
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
|
},
|
|
{
|
|
"url": "https://metacpan.org/release/SRI/Mojolicious-9.38/source/lib/Mojolicious/Command/Author/generate/app.pm#L202",
|
|
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
|
},
|
|
{
|
|
"url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojo/Util.pm#L181",
|
|
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
|
},
|
|
{
|
|
"url": "https://perldoc.perl.org/functions/rand",
|
|
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
|
},
|
|
{
|
|
"url": "https://security.metacpan.org/docs/guides/random-data-for-security.html",
|
|
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
|
}
|
|
]
|
|
} |