CVE-2026-5085

Solstice::Session versions through 1440 for Perl generates session ids insecurely. The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id. The same method is used in the _generateID method in Solstice::Subsession, which is part of the same distribution. The epoch time may be guessed, if it is not leaked in the HTTP Date header. Stringified hash refences will contain predictable content. The built-in rand() function is seeded by 16-bits and is unsuitable for security purposes. The process id comes from a small set of numbers. Predictable session ids could allow an attacker to gain access to systems.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mcrawfor:solstice\:\:session:1440:*:*:*:*:perl:*:*

History

23 Apr 2026, 15:02

Type Values Removed Values Added
CPE cpe:2.3:a:mcrawfor:solstice\:\:session:1440:*:*:*:*:perl:*:*
References () https://metacpan.org/dist/Solstice/source/lib/Solstice/Session.pm#L481 - () https://metacpan.org/dist/Solstice/source/lib/Solstice/Session.pm#L481 - Product
References () https://metacpan.org/dist/Solstice/source/lib/Solstice/Subsession.pm#L105 - () https://metacpan.org/dist/Solstice/source/lib/Solstice/Subsession.pm#L105 - Product
References () https://security.metacpan.org/docs/guides/random-data-for-security.html - () https://security.metacpan.org/docs/guides/random-data-for-security.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2026/04/13/2 - () http://www.openwall.com/lists/oss-security/2026/04/13/2 - Mailing List
First Time Mcrawfor solstice\
Mcrawfor

13 Apr 2026, 16:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/04/13/2 -

13 Apr 2026, 15:17

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

13 Apr 2026, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-13 07:16

Updated : 2026-04-23 15:02


NVD link : CVE-2026-5085

Mitre link : CVE-2026-5085

CVE.ORG link : CVE-2026-5085


JSON object : View

Products Affected

mcrawfor

  • solstice\
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

CWE-340

Generation of Predictable Numbers or Identifiers