|
|
Message-ID: <f7c83c54-96ec-4ba5-8b9c-01a663dc5bdd@cpansec.org> Date: Fri, 15 May 2026 12:14:48 +0100 From: Robert Rothenberg <rrwo@...nsec.org> To: cve-announce@...urity.metacpan.org, oss-security@...ts.openwall.com Subject: CVE-2026-8503: Apache::Session::Generate::SHA256 versions before 1.3.19 for Perl create insecure session ids ======================================================================== CVE-2026-8503 CPAN Security Group ======================================================================== CVE ID: CVE-2026-8503 Distribution: Apache-Session-Browsable Versions: before 1.3.19 MetaCPAN: https://metacpan.org/dist/Apache-Session-Browsable VCS Repo: https://github.com/LemonLDAPNG/Apache-Session-Browseable Apache::Session::Generate::SHA256 versions before 1.3.19 for Perl create insecure session ids Description ----------- Apache::Session::Generate::SHA256 versions before 1.3.19 for Perl create insecure session ids. Apache::Session::Generate::SHA256 generated session ids insecurely. The default session id generator returns a SHA-256 hash of the built-in rand() function, the epoch time, and the PID, that is hashed again. These are predictable, low-entropy sources. Predicable session ids could allow an attacker to gain access to systems. Note that version 1.3.19 has a fallback without warning to use insecure session generation method if the call to Crypt::URandom::urandom fails. However, this is unlikely as Crypt::URandom is a hardcoded requirement of the module. This issue is similar to CVE-2025-40931 for Apache::Session::Generate::MD5. Problem types ------------- - CWE-340 Generation of Predictable Numbers or Identifiers - CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator Workarounds ----------- Upgrade to version 1.3.19 or later. References ---------- https://metacpan.org/release/GUIMARD/Apache-Session-Browseable-1.3.19/changes https://metacpan.org/release/GUIMARD/Apache-Session-Browseable-1.3.19/diff/GUIMARD/Apache-Session-Browseable-1.3.18#lib/Apache/Session/Generate/SHA256.pm https://github.com/LemonLDAPNG/Apache-Session-Browseable/commit/cc915cbbd266776eec3dd8bf4748b15fa827dbd0.patch https://www.cve.org/CVERecord?id=CVE-2025-40931 https://www.cve.org/CVERecord?id=CVE-2025-40932 Timeline -------- - 2026-05-13: Issue identified by CPANSec - 2026-05-13: Issue reported to author - 2026-05-14: Version 1.3.19 released
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.