Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Apache::Session::Generate::SHA256 versions before 1.3.19 for Perl create insecure session ids
Vulnerability Description
Apache::Session::Generate::SHA256 versions before 1.3.19 for Perl create insecure session ids. Apache::Session::Generate::SHA256 generated session ids insecurely. The default session id generator returns a SHA-256 hash of the built-in rand() function, the epoch time, and the PID, that is hashed again. These are predictable, low-entropy sources. Predicable session ids could allow an attacker to gain access to systems. Note that version 1.3.19 has a fallback without warning to use insecure session generation method if the call to Crypt::URandom::urandom fails. However, this is unlikely as Crypt::URandom is a hardcoded requirement of the module. This issue is similar to CVE-2025-40931 for Apache::Session::Generate::MD5.
CVSS Information
N/A
Vulnerability Type
可预测问题
Vulnerability Title
Apache::Session::Generate::SHA256 安全特征问题漏洞
Vulnerability Description
Apache::Session::Generate::SHA256是Apache基金会的一个会话管理模块。 Apache::Session::Generate::SHA256 1.3.19之前版本存在安全特征问题漏洞,该漏洞源于会话ID生成不安全,使用内置rand()函数、纪元时间和PID的SHA-256哈希,这些是可预测的低熵源,可能导致攻击者预测会话ID并获取系统访问权限。
CVSS Information
N/A
Vulnerability Type
N/A