漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely
Vulnerability Description
PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely. PAGI::Middleware::Session::Store::Cookie attempts to read bytes from the /dev/urandom device directly. If that fails (for example, on systems without the device, such as Windows), then it will emit a warning that recommends the user install Crypt::URandom, and then return a string of random bytes generated by the built-in rand function, which is unsuitable for cryptographic applications. This modules does not use the Crypt::URandom module, and installing it will not fix the problem. The random bytes are used for generating an initialisation vector (IV) to encrypt the cookie. A predictable IV may make it easier for malicious users to decrypt and tamper with the session data that is stored in the cookie.
CVSS Information
N/A
Vulnerability Type
使用具有密码学弱点缺陷的PRNG
Vulnerability Title
PAGI::Middleware::Session::Store::Cookie 安全漏洞
Vulnerability Description
PAGI::Middleware::Session::Store::Cookie是JJNAPIORK个人开发者的一个基于Cookie存储会话数据的中间件组件。 PAGI::Middleware::Session::Store::Cookie 0.001003及之前版本存在安全漏洞,该漏洞源于不安全地生成随机字节,可能导致预测初始化向量,进而解密和篡改会话数据。
CVSS Information
N/A
Vulnerability Type
N/A