Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
WebDyne::Session versions through 2.075 for Perl generates the session id insecurely
Vulnerability Description
WebDyne::Session versions through 2.075 for Perl generates the session id insecurely. The session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the seed of the message digest. The rand function is seeded by 32-bits and is predictable. It is considered unsuitable for cryptographic purposes. Predictable session ids could allow an attacker to gain access to systems. Note that WebDyne::Session versions 1.042 and earlier appear to be in separate distributions from WebDyne.
CVSS Information
N/A
Vulnerability Type
可预测问题
Vulnerability Title
WebDyne::Session 安全特征问题漏洞
Vulnerability Description
WebDyne::Session是ASPEER个人开发者的一个用于 Web 应用会话管理的服务器端组件。 WebDyne::Session 2.075及之前版本存在安全特征问题漏洞,该漏洞源于会话ID生成不安全,会话处理程序使用MD5哈希种子调用内置rand函数,rand函数基于进程ID、纪元时间和对象引用地址生成种子,但种子质量不足,rand函数可预测,可能导致攻击者获取系统访问权限。
CVSS Information
N/A
Vulnerability Type
N/A