Specifically Web::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54369 | Web::API 2.8 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Web::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function. |
Fri, 05 Sep 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-331 |
Wed, 09 Apr 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lev
Lev web\ |
|
| CPEs | cpe:2.3:a:lev:web\:\:api:*:*:*:*:*:perl:*:* | |
| Vendors & Products |
Lev
Lev web\ |
Mon, 07 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sat, 05 Apr 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Web::API 2.8 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Web::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function. | |
| Title | Web::API 2.8 and earlier for Perl uses insecure rand() function for cryptographic functions | |
| Weaknesses | CWE-338 | |
| References |
|
|
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2025-09-05T13:18:59.781Z
Reserved: 2025-03-26T14:00:56.441Z
Link: CVE-2024-57868
Updated: 2025-04-07T14:34:30.577Z
Status : Analyzed
Published: 2025-04-05T16:15:33.180
Modified: 2025-11-13T14:38:28.427
Link: CVE-2024-57868
No data.
OpenCVE Enrichment
No data.
EUVD