CVE-2024-58135

5.3 MEDIUM
Published: May 03, 2025 Modified: October 20, 2025

Description

Mojolicious versions from 7.28 for Perl will generate weak HMAC session cookie secrets via "mojo generate app" by default When creating a default app skeleton with the "mojo generate app" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/hashcat/hashcat/pull/4090
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Issue Tracking Patch
https://github.com/mojolicious/mojo/pull/2200
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Exploit Issue Tracking Patch
https://lists.debian.org/debian-perl/2025/05/msg00016.html
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
https://lists.debian.org/debian-perl/2025/05/msg00017.html
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
https://lists.debian.org/debian-perl/2025/05/msg00018.html
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
https://perldoc.perl.org/functions/rand
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Product
https://security.metacpan.org/docs/guides/random-data-for-security.html
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Technical Description

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.3 / 10.0
EPSS (Exploit Probability)
0.1%
31th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mojolicious