CVE-2024-58135 – Mojolicious Weak HMAC Session Secret Vulnerability

The following table lists the changes that have been made to the
CVE-2024-58135 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 9b29abf9-4ab0-4765-b253-1875cd9b441e

    May. 03, 2025

    Action Type Old Value New Value
    Added Description Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets.

    When creating a default app with the “mojo generate app” tool, a weak secret is written to the application’s configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application’s sessions. This may allow an attacker to brute force the application’s session keys.

    Added CWE CWE-338
    Added Reference https://github.com/hashcat/hashcat/pull/4090
    Added Reference https://github.com/mojolicious/mojo/pull/2200
    Added Reference https://metacpan.org/release/SRI/Mojolicious-7.28/source/lib/Mojolicious/Command/generate/app.pm#L220
    Added Reference https://metacpan.org/release/SRI/Mojolicious-9.38/source/lib/Mojolicious/Command/Author/generate/app.pm#L202
    Added Reference https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojo/Util.pm#L181
    Added Reference https://perldoc.perl.org/functions/rand
    Added Reference https://security.metacpan.org/docs/guides/random-data-for-security.html
Share the Post:

Related Posts