CVE-2026-5088
🟡 Monitoruj
Niebezpieczne generowanie wartości losowych w Apache::API::Password umożliwia osłabienie haseł.
CVSS
7.5
EPSS
0.1%
Exploit
none
Vendor
Opis źródłowy (NVD)
Apache::API::Password versions through 0.5.2 for Perl can generate insecure random values for salts. The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function. The rand function is unsuitable for cryptographic use. These salts are used for password hashing.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-15 08:16:16 UTC |
| Ostatnia modyfikacja (NVD) | 2026-05-01 16:16:32 UTC |
Referencje
- https://metacpan.org/pod/Crypt::URandom (9b29abf9-4ab0-4765-b253-1875cd9b441e)
- https://metacpan.org/release/JDEGUEST/Apache2-API-v0.5.2/view/lib/Apache2/API/Password.pod (9b29abf9-4ab0-4765-b253-1875cd9b441e)
- https://metacpan.org/release/JDEGUEST/Apache2-API-v0.5.3/changes (9b29abf9-4ab0-4765-b253-1875cd9b441e)
- https://security.metacpan.org/docs/guides/random-data-for-security.html (9b29abf9-4ab0-4765-b253-1875cd9b441e)
- http://www.openwall.com/lists/oss-security/2026/04/15/4 (af854a3a-2127-422b-91ae-364da2661108)
- http://www.openwall.com/lists/oss-security/2026/04/15/5 (af854a3a-2127-422b-91ae-364da2661108)