CVE-2026-5085

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/04/2026
Last modified:
23/04/2026

Description

Solstice::Session versions through 1440 for Perl generates session ids insecurely.<br /> <br /> The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id.<br /> <br /> The same method is used in the _generateID method in Solstice::Subsession, which is part of the same distribution.<br /> <br /> The epoch time may be guessed, if it is not leaked in the HTTP Date header. Stringified hash refences will contain predictable content. The built-in rand() function is seeded by 16-bits and is unsuitable for security purposes. The process id comes from a small set of numbers.<br /> <br /> Predictable session ids could allow an attacker to gain access to systems.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:mcrawfor:solstice\:\:session:1440:*:*:*:*:perl:*:*