Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <c8c53c8b-acb6-48b0-bc32-166842dd18e9@cpansec.org>
Date: Wed, 8 Apr 2026 06:51:21 +0100
From: Robert Rothenberg <rrwo@...nsec.org>
To: cve-announce@...urity.metacpan.org, oss-security@...ts.openwall.com
Subject: CVE-2026-5082: Amon2::Plugin::Web::CSRFDefender versions from 7.00
 through 7.03 for Perl generate an insecure session id

========================================================================
CVE-2026-5082                                        CPAN Security Group
========================================================================

         CVE ID:  CVE-2026-5082
   Distribution:  Amon2-Plugin-Web-CSRFDefender
       Versions:  from 7.00 through 7.03

       MetaCPAN: https://metacpan.org/dist/Amon2-Plugin-Web-CSRFDefender
       VCS Repo: https://github.com/tokuhirom/Amon2-Plugin-Web-CSRFDefender


Amon2::Plugin::Web::CSRFDefender versions from 7.00 through 7.03 for
Perl generate an insecure session id

Description
-----------
Amon2::Plugin::Web::CSRFDefender versions from 7.00 through 7.03 for
Perl generate an insecure session id.

The generate_session_id function will attempt to read bytes from the
/dev/urandom device, but if that is unavailable then it generates bytes
using SHA-1 hash seeded with the built-in rand() function, the PID, and
the high resolution epoch time.  The PID will come from a small set of
numbers, and the epoch time may be guessed, if it is not leaked from
the HTTP Date header. The built-in rand function is unsuitable for
cryptographic usage.

Amon2::Plugin::Web::CSRFDefender versions before 7.00 were part of
Amon2, which was vulnerable to insecure session ids due to
CVE-2025-15604.

Note that the author has deprecated this module.

Problem types
-------------
- CWE-340 Generation of Predictable Numbers or Identifiers
- CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator

Solutions
---------
Upgrade to Amon2::Plugin::Web::CSRFDefender version 7.04 or later.


References
----------
https://metacpan.org/release/TOKUHIROM/Amon2-Plugin-Web-CSRFDefender-7.03/source/lib/Amon2/Plugin/Web/CSRFDefender/Random.pm
https://metacpan.org/release/TOKUHIROM/Amon2-Plugin-Web-CSRFDefender-7.04/changes
https://www.cve.org/CVERecord?id=CVE-2025-15604



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.