Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q46q-p96m-rvh8

Опубликовано: 22 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 9.1

Описание

Starch versions 0.14 and earlier generate session ids insecurely.

The default session id generator returns a SHA-1 hash seeded with a counter, the epoch time, the built-in rand function, the PID, and internal Perl reference addresses. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.

Predicable session ids could allow an attacker to gain access to systems.

Starch versions 0.14 and earlier generate session ids insecurely.

The default session id generator returns a SHA-1 hash seeded with a counter, the epoch time, the built-in rand function, the PID, and internal Perl reference addresses. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.

Predicable session ids could allow an attacker to gain access to systems.

EPSS

Процентиль: 17%
0.00053
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-338

Связанные уязвимости

CVSS3: 9.1
nvd
5 месяцев назад

Starch versions 0.14 and earlier generate session ids insecurely. The default session id generator returns a SHA-1 hash seeded with a counter, the epoch time, the built-in rand function, the PID, and internal Perl reference addresses. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.

EPSS

Процентиль: 17%
0.00053
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-338