First published: Sat May 03 2025(Updated: )
Mojolicious versions from 0.999922 through 9.39 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.
Credit: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Affected Software | Affected Version | How to fix |
---|---|---|
Mojolicious | >=0.999922<=9.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-58134 has a high severity due to its potential to allow an attacker to forge session cookies.
To fix CVE-2024-58134, update Mojolicious to a version later than 9.39 or change the default HMAC session secret to a more secure, random value.
CVE-2024-58134 affects Mojolicious versions from 0.999922 through 9.39.
Exploiting CVE-2024-58134 could allow attackers to impersonate users by forging valid session cookies.
No, using default settings for session secrets in Mojolicious is not safe due to the predictability of the HMAC session secret.