Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54368 | Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function. |
Fri, 05 Sep 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-331 |
Thu, 10 Apr 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Norbu09
Norbu09 net\ |
|
| CPEs | cpe:2.3:a:norbu09:net\:\:dropbox\:\:api:*:*:*:*:*:perl:*:* | |
| Vendors & Products |
Norbu09
Norbu09 net\ |
Mon, 07 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sat, 05 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function. | |
| Title | Net::Dropbox::API 1.9 and earlier for Perl uses insecure rand() function for cryptographic functions | |
| Weaknesses | CWE-338 | |
| References |
|
|
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2025-09-05T13:19:24.872Z
Reserved: 2025-03-26T14:00:56.360Z
Link: CVE-2024-58036
Updated: 2025-04-07T14:32:59.989Z
Status : Analyzed
Published: 2025-04-05T16:15:33.317
Modified: 2025-09-29T22:36:29.030
Link: CVE-2024-58036
No data.
OpenCVE Enrichment
No data.
EUVD