DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.
History

Wed, 26 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 26 Mar 2025 11:15:00 +0000

Type Values Removed Values Added
Description DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.
Title DBIx::Class::EncodedColumn until 0.00032 for Perl uses insecure rand() function for salting password hashes in Digest.pm
Weaknesses CWE-338
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published: 2025-03-26T11:07:43.089Z

Updated: 2025-03-26T19:17:11.321Z

Reserved: 2025-02-28T20:33:23.575Z

Link: CVE-2025-27551

cve-icon Vulnrichment

Updated: 2025-03-26T19:16:58.915Z

cve-icon NVD

Status : Received

Published: 2025-03-26T11:15:38.943

Modified: 2025-03-26T20:15:22.267

Link: CVE-2025-27551

cve-icon Redhat

No data.