The following table lists the changes that have been made to the
CVE-2024-58135 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 9b29abf9-4ab0-4765-b253-1875cd9b441eMay. 03, 2025
Action Type Old Value New Value Added Description Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets. When creating a default app with the “mojo generate app” tool, a weak secret is written to the application’s configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application’s sessions. This may allow an attacker to brute force the application’s session keys.
Added CWE CWE-338 Added Reference https://github.com/hashcat/hashcat/pull/4090 Added Reference https://github.com/mojolicious/mojo/pull/2200 Added Reference https://metacpan.org/release/SRI/Mojolicious-7.28/source/lib/Mojolicious/Command/generate/app.pm#L220 Added Reference https://metacpan.org/release/SRI/Mojolicious-9.38/source/lib/Mojolicious/Command/Author/generate/app.pm#L202 Added Reference https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojo/Util.pm#L181 Added Reference https://perldoc.perl.org/functions/rand Added Reference https://security.metacpan.org/docs/guides/random-data-for-security.html