Specifically WebService::Xero uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54366 | WebService::Xero 0.11 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically WebService::Xero uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function. |
Fri, 05 Sep 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-331 |
Thu, 10 Apr 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Localshop
Localshop webservice\ |
|
| CPEs | cpe:2.3:a:localshop:webservice\:\:xero:*:*:*:*:*:perl:*:* | |
| Vendors & Products |
Localshop
Localshop webservice\ |
Mon, 07 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sat, 05 Apr 2025 16:30:00 +0000
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2025-09-05T13:18:07.029Z
Reserved: 2025-03-26T14:00:56.456Z
Link: CVE-2024-52322
Updated: 2025-04-07T14:31:46.172Z
Status : Analyzed
Published: 2025-04-05T17:15:39.513
Modified: 2025-11-13T14:34:51.550
Link: CVE-2024-52322
No data.
OpenCVE Enrichment
No data.
EUVD