CVE-2024-58134
Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as an HMAC session cookie secret by default.
These predictable default secrets can be exploited by an attacker to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.
These predictable default secrets can be exploited by an attacker to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.
Vendor
Product
CWE
Yayın Tarihi
2025-05-03 16:15:19
Güncelleme
2025-10-20 20:15:36
Source Identifier
9b29abf9-4ab0-4765-b253-1875cd9b441e
KEV Date Added
-
Kategoriler
Referanslar
https://docs.mojolicious.org/Mojolicious/Guides/FAQ#What-does-Your-secret-passphrase-needs-to-be-changed-mean
https://github.com/hashcat/hashcat/pull/4090
https://github.com/mojolicious/mojo/pull/1791
https://github.com/mojolicious/mojo/pull/2200
https://github.com/mojolicious/mojo/pull/2252
https://lists.debian.org/debian-perl/2025/05/msg00016.html
https://lists.debian.org/debian-perl/2025/05/msg00017.html
https://lists.debian.org/debian-perl/2025/05/msg00018.html
https://medium.com/securing/baking-mojolicious-cookies-revisited-a-case-study-of-solving-security-problems-through-security-by-13da7c225802
https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojolicious.pm#L51
https://www.synacktiv.com/publications/baking-mojolicious-cookies