CVE-2024-52322
5.5
MediumCVE-2024-52322
•
9b29abf9-4ab0-4765-b253-1875cd9b441e
•
Analyzed
Description
WebService::Xero 0.11 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically WebService::Xero uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
Exploits
No known exploits found for this CVE.
Search Exploit-DBReferences
9b29abf9-4ab0-4765-b253-1875cd9b441e
https://metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pm#L5379b29abf9-4ab0-4765-b253-1875cd9b441e
https://metacpan.org/release/LOCALSHOP/WebService-Xero-0.11/source/lib/WebService/Xero/Agent.pm#L179b29abf9-4ab0-4765-b253-1875cd9b441e
https://metacpan.org/release/LOCALSHOP/WebService-Xero-0.11/source/lib/WebService/Xero/Agent.pm#L1789b29abf9-4ab0-4765-b253-1875cd9b441e
https://metacpan.org/release/LOCALSHOP/WebService-Xero-0.11/source/lib/WebService/Xero/Agent/PublicApplication.pm#L139b29abf9-4ab0-4765-b253-1875cd9b441e
https://metacpan.org/release/LOCALSHOP/WebService-Xero-0.11/source/lib/WebService/Xero/Agent/PublicApplication.pm#L939b29abf9-4ab0-4765-b253-1875cd9b441e
https://perldoc.perl.org/functions/rand9b29abf9-4ab0-4765-b253-1875cd9b441e
https://security.metacpan.org/docs/guides/random-data-for-security.html