Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets. When creating a default app with the "mojo generate app" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.
History

Sat, 03 May 2025 10:30:00 +0000

Type Values Removed Values Added
Description Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets. When creating a default app with the "mojo generate app" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.
Title Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets
Weaknesses CWE-338
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published: 2025-05-03T10:16:10.636Z

Updated: 2025-05-03T10:16:10.636Z

Reserved: 2025-04-07T16:06:37.226Z

Link: CVE-2024-58135

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-05-03T11:15:48.037

Modified: 2025-05-03T11:15:48.037

Link: CVE-2024-58135

cve-icon Redhat

No data.