漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Authen::DigestMD5 versions 0.01 through 0.04 for Perl generate the cnonce insecurely
Vulnerability Description
Authen::DigestMD5 versions 0.01 through 0.02 for Perl generate the cnonce insecurely. The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. According to RFC 2831, "The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation depends on a good choice. It is RECOMMENDED that it contain at least 64 bits of entropy."
CVSS Information
N/A
Vulnerability Type
可预测问题
Vulnerability Title
Authen::DigestMD5 安全漏洞
Vulnerability Description
Authen::DigestMD5是Perl社区的一个Perl语言中的模块。 Authen::DigestMD5 0.01至0.02版本存在安全漏洞,该漏洞源于cnonce生成不安全。
CVSS Information
N/A
Vulnerability Type
N/A