CVE-2026-5085
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/04/2026
Última modificación:
23/04/2026
Descripción
*** Pendiente de traducción *** Solstice::Session versions through 1440 for Perl generates session ids insecurely.<br />
<br />
The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id.<br />
<br />
The same method is used in the _generateID method in Solstice::Subsession, which is part of the same distribution.<br />
<br />
The epoch time may be guessed, if it is not leaked in the HTTP Date header. Stringified hash refences will contain predictable content. The built-in rand() function is seeded by 16-bits and is unsuitable for security purposes. The process id comes from a small set of numbers.<br />
<br />
Predictable session ids could allow an attacker to gain access to systems.
Impacto
Puntuación base 3.x
9.10
Gravedad 3.x
CRÍTICA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:mcrawfor:solstice\:\:session:1440:*:*:*:*:perl:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



