{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2024-58135","title":"Title"},{"category":"description","text":"Mojolicious versions from 7.28 for Perl will generate weak HMAC session cookie secrets via \"mojo generate app\" by default\n\nWhen creating a default app skeleton with the \"mojo generate app\" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2024-58135","url":"https://www.suse.com/security/cve/CVE-2024-58135"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1242841 for CVE-2024-58135","url":"https://bugzilla.suse.com/1242841"}],"title":"SUSE CVE CVE-2024-58135","tracking":{"current_release_date":"2025-10-21T23:34:01Z","generator":{"date":"2025-05-08T11:50:02Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2024-58135","initial_release_date":"2025-05-08T11:50:02Z","revision_history":[{"date":"2025-05-08T11:50:02Z","number":"2","summary":"Current version"},{"date":"2025-05-13T03:40:16Z","number":"3","summary":"Current version"},{"date":"2025-10-21T23:34:01Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Module for Package Hub 15 SP7","product":{"name":"SUSE Linux Enterprise Module for Package Hub 15 SP7","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP7","product_identification_helper":{"cpe":"cpe:/o:suse:packagehub:15:sp7"}}},{"category":"product_version","name":"perl-Mojolicious","product":{"name":"perl-Mojolicious","product_id":"perl-Mojolicious","product_identification_helper":{"purl":"pkg:rpm/suse/perl-Mojolicious@?upstream=perl-Mojolicious.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"perl-Mojolicious as component of SUSE Linux Enterprise Module for Package Hub 15 SP7","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP7:perl-Mojolicious"},"product_reference":"perl-Mojolicious","relates_to_product_reference":"SUSE Linux Enterprise Module for Package Hub 15 SP7"}]},"vulnerabilities":[{"cve":"CVE-2024-58135","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-58135"}],"notes":[{"category":"general","text":"Mojolicious versions from 7.28 for Perl will generate weak HMAC session cookie secrets via \"mojo generate app\" by default\n\nWhen creating a default app skeleton with the \"mojo generate app\" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.","title":"CVE description"}],"product_status":{"known_affected":["SUSE Linux Enterprise Module for Package Hub 15 SP7:perl-Mojolicious"]},"references":[{"category":"external","summary":"CVE-2024-58135","url":"https://www.suse.com/security/cve/CVE-2024-58135"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1242841 for CVE-2024-58135","url":"https://bugzilla.suse.com/1242841"}],"threats":[{"category":"impact","date":"2025-05-03T12:00:05Z","details":"moderate"}],"title":"CVE-2024-58135"}]}