CVE-2024-57835
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/04/2025
Last modified:
08/04/2025
Description
Amon2::Auth::Site::LINE uses the String::Random module to generate nonce values. <br />
<br />
String::Random defaults to Perl&#39;s built-in predictable random number generator, the rand() function, which is not cryptographically secure
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:nipotan:line_integration_for_amon2:*:*:*:*:*:*:*:* | 0.04 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://metacpan.org/release/SHLOMIF/String-Random-0.32/source/lib/String/Random.pm#L377
- https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L235
- https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L255
- https://security.metacpan.org/docs/guides/random-data-for-security.html