Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-3255
PUBLISHED
More InfoOfficial Page
Assigner-CPANSec
Assigner Org ID-9b29abf9-4ab0-4765-b253-1875cd9b441e
View Known Exploited Vulnerability (KEV) details
Published At-27 Feb, 2026 | 20:12
Updated At-27 Feb, 2026 | 20:12
Rejected At-
▼CVE Numbering Authority (CNA)
HTTP::Session2 versions before 1.12 for Perl may generate weak session ids using the rand() function

HTTP::Session2 versions before 1.12 for Perl for Perl may generate weak session ids using the rand() function. The HTTP::Session2 session id generator returns a SHA-1 hash seeded with the built-in rand function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand() function is unsuitable for cryptographic usage. HTTP::Session2 after version 1.02 will attempt to use the /dev/urandom device to generate a session id, but if the device is unavailable (for example, under Windows), then it will revert to the insecure method described above.

Affected Products
Vendor
TOKUHIROM
Product
HTTP::Session2
Collection URL
https://cpan.org/modules
Package Name
HTTP-Session2
Repo
https://github.com/tokuhirom/HTTP-Session2
Default Status
unaffected
Versions
Affected
  • From 0 before 1.12 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-340CWE-340 Generation of Predictable Numbers or Identifiers
CWECWE-338CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator
Type: CWE
CWE ID: CWE-340
Description: CWE-340 Generation of Predictable Numbers or Identifiers
Type: CWE
CWE ID: CWE-338
Description: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-115CAPEC-115 Authentication Bypass
CAPEC ID: CAPEC-115
Description: CAPEC-115 Authentication Bypass
Solutions

HTTP::Session2 has been deprecated since version 1.11. Migrate to a different solution.

Configurations

Workarounds

Upgrade to version 1.12 or later.

Exploits

Credits

Timeline
EventDate
version 1.02 HTTP::Session2 released that attempts to use /dev/urandom.2014-07-31 00:00:00
version 1.11 HTTP::Session2 deprecated2026-02-24 00:00:00
version 1.12 HTTP::Session2 released with a fix with a portable solution.2026-02-26 00:00:00
Event: version 1.02 HTTP::Session2 released that attempts to use /dev/urandom.
Date: 2014-07-31 00:00:00
Event: version 1.11 HTTP::Session2 deprecated
Date: 2026-02-24 00:00:00
Event: version 1.12 HTTP::Session2 released with a fix with a portable solution.
Date: 2026-02-26 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://metacpan.org/release/TOKUHIROM/HTTP-Session2-1.11/source/lib/HTTP/Session2/Random.pm#L35
N/A
https://metacpan.org/release/TOKUHIROM/HTTP-Session2-1.01/source/lib/HTTP/Session2/ServerStore.pm#L68
N/A
https://metacpan.org/release/TOKUHIROM/HTTP-Session2-1.12/changes
release-notes
https://github.com/tokuhirom/HTTP-Session2/commit/9cfde4d7e0965172aef5dcfa3b03bb48df93e636.patch
patch
Hyperlink: https://metacpan.org/release/TOKUHIROM/HTTP-Session2-1.11/source/lib/HTTP/Session2/Random.pm#L35
Resource: N/A
Hyperlink: https://metacpan.org/release/TOKUHIROM/HTTP-Session2-1.01/source/lib/HTTP/Session2/ServerStore.pm#L68
Resource: N/A
Hyperlink: https://metacpan.org/release/TOKUHIROM/HTTP-Session2-1.12/changes
Resource:
release-notes
Hyperlink: https://github.com/tokuhirom/HTTP-Session2/commit/9cfde4d7e0965172aef5dcfa3b03bb48df93e636.patch
Resource:
patch
Details not found