CVE-2025-40924

NameCVE-2025-40924
DescriptionCatalyst::Plugin::Session before version 0.44 for Perl generates session ids insecurely. The session id is generated from a (usually SHA-1) hash of a simple counter, the epoch time, the built-in rand function, the PID and the current Catalyst context. This information is of low entropy. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1109439

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libcatalyst-plugin-session-perl (PTS)bullseye0.41-1vulnerable
sid, trixie, bookworm0.43-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libcatalyst-plugin-session-perlsource(unstable)(unfixed)1109439

Notes

[bookworm] - libcatalyst-plugin-session-perl <no-dsa> (Minor issue)
[bullseye] - libcatalyst-plugin-session-perl <postponed> (Minor issue, weak entropy for session ID)
https://lists.security.metacpan.org/cve-announce/msg/31252285/
https://github.com/perl-catalyst/Catalyst-Plugin-Session/pull/5
Fixed by: https://github.com/perl-catalyst/Catalyst-Plugin-Session/commit/c0e2b4ab1e42ebce1008286db8c571b6ee98c22c (v0.44)

Search for package or bug name: Reporting problems