CVE-2024-57835: Amon2::Auth::Site::LINE versions through 0.04 for Perl uses insecure rand() function for cryptographic functions Timothy Legge 05 Apr 2025 16:12 UTC

========================================================================
CVE-2024-57835                                       CPAN Security Group
========================================================================

         CVE ID:  CVE-2024-57835
   Distribution:  Amon2-Auth-Site-LINE
       Versions:  through 0.04

       MetaCPAN:  https://metacpan.org/dist/Amon2-Auth-Site-LINE
       VCS Repo:  https://github.com/nipotan/p5-Amon2-Auth-Site-LINE

Amon2::Auth::Site::LINE versions through 0.04 for Perl uses insecure
rand() function for cryptographic functions

Description
-----------
Amon2::Auth::Site::LINE uses the String::Random module to generate
nonce values. 

String::Random defaults to Perl's built-in predictable random number
generator, the rand() function, which is not cryptographically secure

Problem types
-------------
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator
(PRNG)

References
----------
https://metacpan.org/release/SHLOMIF/String-Random-0.32/source/lib/String/Random.pm#L377
https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L235
https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L255
https://security.metacpan.org/docs/guides/random-data-for-security.html