First published: Sat May 03 2025(Updated: )
Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets. When creating a default app with the "mojo generate app" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.
Credit: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Affected Software | Affected Version | How to fix |
---|---|---|
Mojolicious | >=7.28<=9.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-58135 is considered a high severity vulnerability due to weak HMAC session secrets being generated.
To fix CVE-2024-58135, update your Mojolicious version to 9.40 or higher to ensure secure HMAC session secrets are used.
CVE-2024-58135 affects Mojolicious versions from 7.28 to 9.39 inclusive.
The main issue with CVE-2024-58135 is the generation of weak HMAC session secrets using the insecure rand() function.
Weak HMAC secrets may allow attackers to forge authentication tokens, potentially leading to unauthorized access.