Vulnerabilites related to mojolicious - mojolicious
Vulnerability from fkie_nvd
Published
2025-05-03 16:15
Modified
2025-06-17 14:15
Summary
Mojolicious versions from 0.999922 through 9.40 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.
Impacted products
Vendor Product Version
mojolicious mojolicious *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:perl:*:*",
              "matchCriteriaId": "007066BB-83B9-4F4C-BAAB-261837197373",
              "versionEndIncluding": "9.40",
              "versionStartIncluding": "0.999922",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Mojolicious versions from 0.999922 through 9.40 for Perl uses a hard coded string, or the application\u0027s class name, as a HMAC session secret by default.\n\nThese predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user\u2019s session."
    },
    {
      "lang": "es",
      "value": "Las versiones de Mojolicious de la 0.999922 a la 9.39 para Perl utilizan una cadena de c\u00f3digo fijo, o el nombre de la clase de la aplicaci\u00f3n, como secreto de sesi\u00f3n HMAC por defecto. Estos secretos predeterminados predecibles pueden explotarse para falsificar cookies de sesi\u00f3n. Un atacante que conozca o adivine el secreto podr\u00eda calcular firmas HMAC v\u00e1lidas para la cookie de sesi\u00f3n, lo que le permitir\u00eda manipular o secuestrar la sesi\u00f3n de otro usuario."
    }
  ],
  "id": "CVE-2024-58134",
  "lastModified": "2025-06-17T14:15:38.223",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-03T16:15:19.310",
  "references": [
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://github.com/hashcat/hashcat/pull/4090"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://github.com/mojolicious/mojo/pull/1791"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://github.com/mojolicious/mojo/pull/2200"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://medium.com/securing/baking-mojolicious-cookies-revisited-a-case-study-of-solving-security-problems-through-security-by-13da7c225802"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Product"
      ],
      "url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojolicious.pm#L51"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.synacktiv.com/publications/baking-mojolicious-cookies"
    }
  ],
  "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-321"
        },
        {
          "lang": "en",
          "value": "CWE-331"
        }
      ],
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-05-03 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the MojoX::Dispatcher::Static implementation in Mojolicious before 0.991250 has unknown impact and attack vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4EDEE1D-9A82-47F2-BED9-DCA9913DD64A",
              "versionEndIncluding": "0.991246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "083A2DA9-38BB-4AF8-9FF0-41101E830A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C11EC7-D91E-4F65-9C8A-801C724EDBBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33620B-2B78-4221-8067-15E8BC56865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AC00B5-717B-4F7F-AD25-9754BEFD7221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2E2469A-BE25-4D18-8E7D-F709DCB86FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "02BB8742-9D5C-4831-BD2F-A24505B8E4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CA1476-123D-44D5-A1E8-D9C58F6D9949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "479781F2-9614-4552-AE39-12AC41ABB3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D1279D-333D-4338-B4ED-07BB1900FB0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D21184D-8823-4162-961D-8A7856557786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "538FC292-B6BF-4551-AE44-259E0B61B680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "574F7A7C-3986-401D-A58F-6C8F7D922002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDACD094-8117-460E-B7D1-E63EC00B97A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8006:*:*:*:*:*:*:*",
              "matchCriteriaId": "6965DAA1-FDD8-484B-873A-F6D13227FAD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8007:*:*:*:*:*:*:*",
              "matchCriteriaId": "9865E142-BB29-4718-BD85-F40E185BF31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8008:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F667C15-3C89-49CD-800D-303A2677FC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8009:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B301544-A38F-417C-BB94-E7711F8ED7C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9001:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADEBDEB2-3070-4633-A934-DDF49CBD10C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9002:*:*:*:*:*:*:*",
              "matchCriteriaId": "5875A25D-CC0E-43CF-B617-CEA99C65A52A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991231:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8C04B9B-DEA3-4161-8E6C-BBBBE9AF5444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991232:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5F9699-7B1B-4356-B0EB-C942888AFEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991233:*:*:*:*:*:*:*",
              "matchCriteriaId": "A041B8EB-AD9E-452B-9A2E-22DBCD5CB091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991234:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE7A136-3975-400A-AB77-4BCD4669553A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991235:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE628F19-D7C9-4E6D-BDC4-5C82CDE540E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991236:*:*:*:*:*:*:*",
              "matchCriteriaId": "26803A52-EAEC-4CD6-BB89-F1EF40B3021F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991237:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BC4454-3168-420B-9136-21FD18571526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991238:*:*:*:*:*:*:*",
              "matchCriteriaId": "A346280F-BA80-4FBA-BD15-6CA7A1ED8D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991239:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0376F10-8493-498D-9B5D-76AFE0F4417A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991240:*:*:*:*:*:*:*",
              "matchCriteriaId": "69293BBF-7788-4462-AA6F-9D3A084D1B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991241:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F30FA3-69EC-45B3-8AF5-852DB73756A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991242:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88557E4-C793-4F6A-A3AE-07799B212ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991243:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F88C231-60FE-42F3-87E9-23E88ADC7650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991244:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD65F43C-98A9-46A1-BCC4-79ACB5F5C6B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991245:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A9F1C7-1C0A-42B1-91D3-676E03E64BB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MojoX::Dispatcher::Static implementation in Mojolicious before 0.991250 has unknown impact and attack vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad sin especificar en la implementaci\u00f3n de MojoX::Dispatcher::Static en Mojolicious en versiones anteriores a v0.991250 tiene impacto y vectores de ataque no especificados"
    }
  ],
  "id": "CVE-2009-5074",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-05-03T00:55:00.890",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-04-08 00:15
Modified
2025-05-05 17:50
Summary
The Mojolicious module before 9.11 for Perl has a bug in format detection that can potentially be exploited for denial of service.
Impacted products
Vendor Product Version
mojolicious mojolicious *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:perl:*:*",
              "matchCriteriaId": "C3DC8788-5BF5-4B67-BDC1-12584F7A8467",
              "versionEndExcluding": "9.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Mojolicious module before 9.11 for Perl has a bug in format detection that can potentially be exploited for denial of service."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Mojolicious anterior a la versi\u00f3n 9.11 para Perl tiene un error en la detecci\u00f3n de formato que potencialmente puede explotarse para denegar el servicio."
    }
  ],
  "id": "CVE-2021-47208",
  "lastModified": "2025-05-05T17:50:38.203",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-08T00:15:07.920",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/mojolicious/mojo/commit/a0c4576ffb11c235088550de9ba7ac4196e1953c"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://github.com/mojolicious/mojo/issues/1736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/mojolicious/mojo/commit/a0c4576ffb11c235088550de9ba7ac4196e1953c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://github.com/mojolicious/mojo/issues/1736"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-29 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952Exploit
secalert@redhat.comhttp://cpansearch.perl.org/src/KRAIH/Mojolicious-1.16/Changes
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-April/058885.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-April/058891.html
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/04/17/1Exploit, Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/04/18/3Exploit, Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/04/18/7Exploit
secalert@redhat.comhttp://perlninja.posterous.com/sharks-in-the-water
secalert@redhat.comhttp://search.cpan.org/CPAN/authors/id/K/KR/KRAIH/Mojolicious-1.16.tar.gzPatch
secalert@redhat.comhttp://secunia.com/advisories/44051Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/44359
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2221
secalert@redhat.comhttp://www.osvdb.org/71850Exploit
secalert@redhat.comhttp://www.securityfocus.com/bid/47402
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/1072
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/1093
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=697229Exploit, Patch
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/66830
secalert@redhat.comhttps://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818Patch
secalert@redhat.comhttps://github.com/kraih/mojo/issues/114Exploit
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952Exploit
af854a3a-2127-422b-91ae-364da2661108http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.16/Changes
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058885.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058891.html
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/04/17/1Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/04/18/3Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/04/18/7Exploit
af854a3a-2127-422b-91ae-364da2661108http://perlninja.posterous.com/sharks-in-the-water
af854a3a-2127-422b-91ae-364da2661108http://search.cpan.org/CPAN/authors/id/K/KR/KRAIH/Mojolicious-1.16.tar.gzPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44051Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44359
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2221
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/71850Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/47402
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/1072
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/1093
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=697229Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/66830
af854a3a-2127-422b-91ae-364da2661108https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/kraih/mojo/issues/114Exploit
Impacted products
Vendor Product Version
mojolicious mojolicious 0.2
mojolicious mojolicious 0.3
mojolicious mojolicious 0.4
mojolicious mojolicious 0.5
mojolicious mojolicious 0.6
mojolicious mojolicious 0.7
mojolicious mojolicious 0.8
mojolicious mojolicious 0.8.1
mojolicious mojolicious 0.8.2
mojolicious mojolicious 0.8.3
mojolicious mojolicious 0.8.4
mojolicious mojolicious 0.8.5
mojolicious mojolicious 0.9
mojolicious mojolicious 0.8006
mojolicious mojolicious 0.8007
mojolicious mojolicious 0.8008
mojolicious mojolicious 0.8009
mojolicious mojolicious 0.9001
mojolicious mojolicious 0.9002
mojolicious mojolicious 0.991231
mojolicious mojolicious 0.991232
mojolicious mojolicious 0.991233
mojolicious mojolicious 0.991234
mojolicious mojolicious 0.991235
mojolicious mojolicious 0.991236
mojolicious mojolicious 0.991237
mojolicious mojolicious 0.991238
mojolicious mojolicious 0.991239
mojolicious mojolicious 0.991240
mojolicious mojolicious 0.991241
mojolicious mojolicious 0.991242
mojolicious mojolicious 0.991243
mojolicious mojolicious 0.991244
mojolicious mojolicious 0.991245
mojolicious mojolicious 0.991246
mojolicious mojolicious 0.991250
mojolicious mojolicious 0.991251
mojolicious mojolicious 0.999901
mojolicious mojolicious 0.999902
mojolicious mojolicious 0.999903
mojolicious mojolicious 0.999904
mojolicious mojolicious 0.999905
mojolicious mojolicious 0.999906
mojolicious mojolicious 0.999907
mojolicious mojolicious 0.999908
mojolicious mojolicious 0.999909
mojolicious mojolicious 0.999910
mojolicious mojolicious 0.999911
mojolicious mojolicious 0.999912
mojolicious mojolicious 0.999913
mojolicious mojolicious 0.999914
mojolicious mojolicious 0.999920
mojolicious mojolicious 0.999921
mojolicious mojolicious 0.999922
mojolicious mojolicious 0.999923
mojolicious mojolicious 0.999924
mojolicious mojolicious 0.999925
mojolicious mojolicious 0.999926
mojolicious mojolicious 0.999927
mojolicious mojolicious 0.999928
mojolicious mojolicious 0.999929
mojolicious mojolicious 0.999930
mojolicious mojolicious 0.999931
mojolicious mojolicious 0.999932
mojolicious mojolicious 0.999933
mojolicious mojolicious 0.999934
mojolicious mojolicious 0.999935
mojolicious mojolicious 0.999936
mojolicious mojolicious 0.999937
mojolicious mojolicious 0.999938
mojolicious mojolicious 0.999939
mojolicious mojolicious 0.999940
mojolicious mojolicious 0.999941
mojolicious mojolicious 0.999950
mojolicious mojolicious 1.0
mojolicious mojolicious 1.1
mojolicious mojolicious 1.01
mojolicious mojolicious 1.11
mojolicious mojolicious 1.12
mojolicious mojolicious 1.13
mojolicious mojolicious 1.14
mojolicious mojolicious 1.15



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "083A2DA9-38BB-4AF8-9FF0-41101E830A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C11EC7-D91E-4F65-9C8A-801C724EDBBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33620B-2B78-4221-8067-15E8BC56865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AC00B5-717B-4F7F-AD25-9754BEFD7221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2E2469A-BE25-4D18-8E7D-F709DCB86FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "02BB8742-9D5C-4831-BD2F-A24505B8E4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CA1476-123D-44D5-A1E8-D9C58F6D9949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "479781F2-9614-4552-AE39-12AC41ABB3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D1279D-333D-4338-B4ED-07BB1900FB0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D21184D-8823-4162-961D-8A7856557786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "538FC292-B6BF-4551-AE44-259E0B61B680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "574F7A7C-3986-401D-A58F-6C8F7D922002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDACD094-8117-460E-B7D1-E63EC00B97A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8006:*:*:*:*:*:*:*",
              "matchCriteriaId": "6965DAA1-FDD8-484B-873A-F6D13227FAD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8007:*:*:*:*:*:*:*",
              "matchCriteriaId": "9865E142-BB29-4718-BD85-F40E185BF31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8008:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F667C15-3C89-49CD-800D-303A2677FC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8009:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B301544-A38F-417C-BB94-E7711F8ED7C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9001:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADEBDEB2-3070-4633-A934-DDF49CBD10C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9002:*:*:*:*:*:*:*",
              "matchCriteriaId": "5875A25D-CC0E-43CF-B617-CEA99C65A52A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991231:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8C04B9B-DEA3-4161-8E6C-BBBBE9AF5444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991232:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5F9699-7B1B-4356-B0EB-C942888AFEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991233:*:*:*:*:*:*:*",
              "matchCriteriaId": "A041B8EB-AD9E-452B-9A2E-22DBCD5CB091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991234:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE7A136-3975-400A-AB77-4BCD4669553A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991235:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE628F19-D7C9-4E6D-BDC4-5C82CDE540E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991236:*:*:*:*:*:*:*",
              "matchCriteriaId": "26803A52-EAEC-4CD6-BB89-F1EF40B3021F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991237:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BC4454-3168-420B-9136-21FD18571526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991238:*:*:*:*:*:*:*",
              "matchCriteriaId": "A346280F-BA80-4FBA-BD15-6CA7A1ED8D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991239:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0376F10-8493-498D-9B5D-76AFE0F4417A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991240:*:*:*:*:*:*:*",
              "matchCriteriaId": "69293BBF-7788-4462-AA6F-9D3A084D1B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991241:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F30FA3-69EC-45B3-8AF5-852DB73756A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991242:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88557E4-C793-4F6A-A3AE-07799B212ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991243:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F88C231-60FE-42F3-87E9-23E88ADC7650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991244:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD65F43C-98A9-46A1-BCC4-79ACB5F5C6B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991245:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A9F1C7-1C0A-42B1-91D3-676E03E64BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991246:*:*:*:*:*:*:*",
              "matchCriteriaId": "A886B4DC-30E9-4C41-A79A-96F309F343F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991250:*:*:*:*:*:*:*",
              "matchCriteriaId": "C28AEC3C-20F0-4BFB-B7B6-30336C631400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991251:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0521BF-A66D-4663-83C6-49E650454ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999901:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C95BB3D-774C-4C71-9A3A-15938BA5CF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999902:*:*:*:*:*:*:*",
              "matchCriteriaId": "B583B413-4B8E-4FA3-9CD1-A650CEAB9449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999903:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC7A6F1-BD38-4119-B5A7-56A50EC6C9C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999904:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DEFF843-57F4-4553-ABD3-7269A32A6DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999905:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8A7C4E6-5E3E-43CB-8F54-4AA5563EA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999906:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CB9879-D8B4-45CA-BF63-D4681C403818",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999907:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EE203A-CFB1-4317-879D-E6A44F063F66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999908:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7978FDA-7622-4041-BE9E-28F99A1FB16E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999909:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0975B5B-5409-42F5-A50F-644A80F3E5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999910:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AB9069-49F9-43B5-9F0F-04BBB145FD7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999911:*:*:*:*:*:*:*",
              "matchCriteriaId": "77CA7A3A-254D-4154-8AFB-FA7BC4EB286A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999912:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA8D9CE-BD9E-4BD2-B38C-909CCE0D3842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999913:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DABFC81-F44C-46AB-B9CD-D35624F5071A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999914:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8BDB83-641B-4858-B00A-EEFC9F583050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999920:*:*:*:*:*:*:*",
              "matchCriteriaId": "D010713B-DE3E-4E76-8299-FF50D19ADA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999921:*:*:*:*:*:*:*",
              "matchCriteriaId": "92B83ECE-5D7C-417D-9957-976ECE8E2308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999922:*:*:*:*:*:*:*",
              "matchCriteriaId": "59E2E6AF-11DD-4C51-A84F-129D160ACAFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999923:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9590109-8DFC-4E78-B678-8456A0621C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999924:*:*:*:*:*:*:*",
              "matchCriteriaId": "03FD1031-0C3D-45F1-BFD9-823C6D4B69F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999925:*:*:*:*:*:*:*",
              "matchCriteriaId": "44059C1E-CDC6-4B75-92CC-CD45C5063F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999926:*:*:*:*:*:*:*",
              "matchCriteriaId": "6278FC7E-6852-46B1-9F38-58847391B2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999927:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FDE0AA-B353-4CD8-BC9D-DFC709031FF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999928:*:*:*:*:*:*:*",
              "matchCriteriaId": "CABDE1E8-17E9-4EF5-91C7-9688B0F49AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999929:*:*:*:*:*:*:*",
              "matchCriteriaId": "66454D2F-C566-4F3D-AF78-C3FE75A6C62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999930:*:*:*:*:*:*:*",
              "matchCriteriaId": "83E28BE4-60FE-46E9-8AA4-45B14A34E2CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999931:*:*:*:*:*:*:*",
              "matchCriteriaId": "914475F6-3C2F-4D15-8017-588763BF37E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999932:*:*:*:*:*:*:*",
              "matchCriteriaId": "12806A34-36FA-4B19-B84E-7385A8EDB302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999933:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAB41DB0-C61F-441F-A8C7-624845EE39ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999934:*:*:*:*:*:*:*",
              "matchCriteriaId": "3762061D-FCC3-43EE-BC73-1BEF6BBC8980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999935:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE3BAE8-B78E-490E-90A7-8DF957D9CA7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999936:*:*:*:*:*:*:*",
              "matchCriteriaId": "C347C9AE-D2AA-4440-B506-1B692C7C52CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999937:*:*:*:*:*:*:*",
              "matchCriteriaId": "62704DAC-BFE8-4D27-9F2E-FB8D70E43063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999938:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C3E1157-11FB-45FA-8E4A-53A3614B335D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999939:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9674613-3BDB-471E-A109-83FF1463FCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999940:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB59D0D0-E453-4700-9A96-9A452E5C90E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999941:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A3B80D-8BD9-4F01-AAA8-B50CB3084E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999950:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCB14A8-635D-4652-9F76-E718F60D0FC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD46D41-AE54-4223-A659-7E21EC0EC6A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "393D68B4-0E53-4973-80FF-F57CC470E16B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "151552D1-9D07-4424-863B-FC1948619799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A06E107C-680E-4032-9E4A-1A8A641BB0E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0950430-F9CC-4FF8-801B-62BDCEEDA356",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D6573B3-A92D-497E-8238-9F934C519A51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04F3413-81FB-4B48-8D43-FD7E367B711E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F11435-B786-44F2-9E6B-09E0C743913F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de salto de directorio en Path.pm en Mojolicious antes de v1.16 permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de un 2f%..%2f (barra punto punto barra) en una URI."
    }
  ],
  "id": "CVE-2011-1589",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-29T22:55:02.467",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.16/Changes"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058885.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058891.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/04/17/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/04/18/3"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/04/18/7"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://perlninja.posterous.com/sharks-in-the-water"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://search.cpan.org/CPAN/authors/id/K/KR/KRAIH/Mojolicious-1.16.tar.gz"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44051"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/44359"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2221"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.osvdb.org/71850"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/47402"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2011/1072"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2011/1093"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697229"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66830"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://github.com/kraih/mojo/issues/114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.16/Changes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058885.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058891.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/04/17/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/04/18/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/04/18/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://perlninja.posterous.com/sharks-in-the-water"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://search.cpan.org/CPAN/authors/id/K/KR/KRAIH/Mojolicious-1.16.tar.gz"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44359"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.osvdb.org/71850"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/47402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/1072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/1093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66830"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://github.com/kraih/mojo/issues/114"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-05-03 11:15
Modified
2025-06-17 14:16
Summary
Mojolicious versions from 7.28 through 9.40 for Perl may generate weak HMAC session secrets. When creating a default app with the "mojo generate app" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.
Impacted products
Vendor Product Version
mojolicious mojolicious *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:perl:*:*",
              "matchCriteriaId": "18CB7F71-95D5-44DC-BD63-01394CC408B4",
              "versionEndIncluding": "9.40",
              "versionStartIncluding": "7.28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Mojolicious versions from 7.28 through 9.40 for Perl may generate weak HMAC session secrets.\n\nWhen creating a default app with the \"mojo generate app\" tool, a weak secret is written to the application\u0027s configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application\u0027s sessions. This may allow an attacker to brute force the application\u0027s session keys."
    },
    {
      "lang": "es",
      "value": "Las versiones de Mojolicious de la 7.28 a la 9.39 para Perl pueden generar secretos de sesi\u00f3n HMAC d\u00e9biles. Al crear una aplicaci\u00f3n predeterminada con la herramienta \"mojo generate app\", se escribe un secreto d\u00e9bil en el archivo de configuraci\u00f3n de la aplicaci\u00f3n mediante la funci\u00f3n insegura rand(), que se utiliza para autenticar y proteger la integridad de las sesiones de la aplicaci\u00f3n. Esto podr\u00eda permitir a un atacante acceder por fuerza bruta a las claves de sesi\u00f3n de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2024-58135",
  "lastModified": "2025-06-17T14:16:05.757",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-03T11:15:48.037",
  "references": [
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://github.com/hashcat/hashcat/pull/4090"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://github.com/mojolicious/mojo/pull/2200"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Product"
      ],
      "url": "https://metacpan.org/release/SRI/Mojolicious-7.28/source/lib/Mojolicious/Command/generate/app.pm#L220"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Product"
      ],
      "url": "https://metacpan.org/release/SRI/Mojolicious-9.38/source/lib/Mojolicious/Command/Author/generate/app.pm#L202"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Product"
      ],
      "url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojo/Util.pm#L181"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Product"
      ],
      "url": "https://perldoc.perl.org/functions/rand"
    },
    {
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "tags": [
        "Technical Description"
      ],
      "url": "https://security.metacpan.org/docs/guides/random-data-for-security.html"
    }
  ],
  "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-338"
        }
      ],
      "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-338"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-05-03 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.
Impacted products
Vendor Product Version
mojolicious mojolicious *
mojolicious mojolicious 0.2
mojolicious mojolicious 0.3
mojolicious mojolicious 0.4
mojolicious mojolicious 0.5
mojolicious mojolicious 0.6
mojolicious mojolicious 0.7
mojolicious mojolicious 0.8
mojolicious mojolicious 0.8.1
mojolicious mojolicious 0.8.2
mojolicious mojolicious 0.8.3
mojolicious mojolicious 0.8.4
mojolicious mojolicious 0.8.5
mojolicious mojolicious 0.9
mojolicious mojolicious 0.8006
mojolicious mojolicious 0.8007
mojolicious mojolicious 0.8008
mojolicious mojolicious 0.8009
mojolicious mojolicious 0.9001
mojolicious mojolicious 0.9002
mojolicious mojolicious 0.991231
mojolicious mojolicious 0.991232
mojolicious mojolicious 0.991233
mojolicious mojolicious 0.991234
mojolicious mojolicious 0.991235
mojolicious mojolicious 0.991236
mojolicious mojolicious 0.991237
mojolicious mojolicious 0.991238
mojolicious mojolicious 0.991239
mojolicious mojolicious 0.991240
mojolicious mojolicious 0.991241
mojolicious mojolicious 0.991242
mojolicious mojolicious 0.991243
mojolicious mojolicious 0.991244
mojolicious mojolicious 0.991245
mojolicious mojolicious 0.991246
mojolicious mojolicious 0.991250
mojolicious mojolicious 0.991251
mojolicious mojolicious 0.999901
mojolicious mojolicious 0.999902
mojolicious mojolicious 0.999903
mojolicious mojolicious 0.999904
mojolicious mojolicious 0.999905
mojolicious mojolicious 0.999906
mojolicious mojolicious 0.999907
mojolicious mojolicious 0.999908
mojolicious mojolicious 0.999909
mojolicious mojolicious 0.999910
mojolicious mojolicious 0.999911
mojolicious mojolicious 0.999912
mojolicious mojolicious 0.999913
mojolicious mojolicious 0.999914
mojolicious mojolicious 0.999920
mojolicious mojolicious 0.999921
mojolicious mojolicious 0.999922
mojolicious mojolicious 0.999923
mojolicious mojolicious 0.999924
mojolicious mojolicious 0.999925



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25683375-5B17-469D-AB89-A1A7E165948C",
              "versionEndIncluding": "0.999926",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "083A2DA9-38BB-4AF8-9FF0-41101E830A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C11EC7-D91E-4F65-9C8A-801C724EDBBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33620B-2B78-4221-8067-15E8BC56865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AC00B5-717B-4F7F-AD25-9754BEFD7221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2E2469A-BE25-4D18-8E7D-F709DCB86FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "02BB8742-9D5C-4831-BD2F-A24505B8E4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CA1476-123D-44D5-A1E8-D9C58F6D9949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "479781F2-9614-4552-AE39-12AC41ABB3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D1279D-333D-4338-B4ED-07BB1900FB0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D21184D-8823-4162-961D-8A7856557786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "538FC292-B6BF-4551-AE44-259E0B61B680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "574F7A7C-3986-401D-A58F-6C8F7D922002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDACD094-8117-460E-B7D1-E63EC00B97A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8006:*:*:*:*:*:*:*",
              "matchCriteriaId": "6965DAA1-FDD8-484B-873A-F6D13227FAD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8007:*:*:*:*:*:*:*",
              "matchCriteriaId": "9865E142-BB29-4718-BD85-F40E185BF31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8008:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F667C15-3C89-49CD-800D-303A2677FC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8009:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B301544-A38F-417C-BB94-E7711F8ED7C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9001:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADEBDEB2-3070-4633-A934-DDF49CBD10C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9002:*:*:*:*:*:*:*",
              "matchCriteriaId": "5875A25D-CC0E-43CF-B617-CEA99C65A52A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991231:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8C04B9B-DEA3-4161-8E6C-BBBBE9AF5444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991232:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5F9699-7B1B-4356-B0EB-C942888AFEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991233:*:*:*:*:*:*:*",
              "matchCriteriaId": "A041B8EB-AD9E-452B-9A2E-22DBCD5CB091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991234:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE7A136-3975-400A-AB77-4BCD4669553A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991235:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE628F19-D7C9-4E6D-BDC4-5C82CDE540E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991236:*:*:*:*:*:*:*",
              "matchCriteriaId": "26803A52-EAEC-4CD6-BB89-F1EF40B3021F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991237:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BC4454-3168-420B-9136-21FD18571526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991238:*:*:*:*:*:*:*",
              "matchCriteriaId": "A346280F-BA80-4FBA-BD15-6CA7A1ED8D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991239:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0376F10-8493-498D-9B5D-76AFE0F4417A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991240:*:*:*:*:*:*:*",
              "matchCriteriaId": "69293BBF-7788-4462-AA6F-9D3A084D1B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991241:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F30FA3-69EC-45B3-8AF5-852DB73756A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991242:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88557E4-C793-4F6A-A3AE-07799B212ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991243:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F88C231-60FE-42F3-87E9-23E88ADC7650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991244:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD65F43C-98A9-46A1-BCC4-79ACB5F5C6B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991245:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A9F1C7-1C0A-42B1-91D3-676E03E64BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991246:*:*:*:*:*:*:*",
              "matchCriteriaId": "A886B4DC-30E9-4C41-A79A-96F309F343F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991250:*:*:*:*:*:*:*",
              "matchCriteriaId": "C28AEC3C-20F0-4BFB-B7B6-30336C631400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991251:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0521BF-A66D-4663-83C6-49E650454ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999901:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C95BB3D-774C-4C71-9A3A-15938BA5CF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999902:*:*:*:*:*:*:*",
              "matchCriteriaId": "B583B413-4B8E-4FA3-9CD1-A650CEAB9449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999903:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC7A6F1-BD38-4119-B5A7-56A50EC6C9C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999904:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DEFF843-57F4-4553-ABD3-7269A32A6DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999905:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8A7C4E6-5E3E-43CB-8F54-4AA5563EA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999906:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CB9879-D8B4-45CA-BF63-D4681C403818",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999907:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EE203A-CFB1-4317-879D-E6A44F063F66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999908:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7978FDA-7622-4041-BE9E-28F99A1FB16E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999909:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0975B5B-5409-42F5-A50F-644A80F3E5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999910:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AB9069-49F9-43B5-9F0F-04BBB145FD7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999911:*:*:*:*:*:*:*",
              "matchCriteriaId": "77CA7A3A-254D-4154-8AFB-FA7BC4EB286A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999912:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA8D9CE-BD9E-4BD2-B38C-909CCE0D3842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999913:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DABFC81-F44C-46AB-B9CD-D35624F5071A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999914:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8BDB83-641B-4858-B00A-EEFC9F583050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999920:*:*:*:*:*:*:*",
              "matchCriteriaId": "D010713B-DE3E-4E76-8299-FF50D19ADA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999921:*:*:*:*:*:*:*",
              "matchCriteriaId": "92B83ECE-5D7C-417D-9957-976ECE8E2308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999922:*:*:*:*:*:*:*",
              "matchCriteriaId": "59E2E6AF-11DD-4C51-A84F-129D160ACAFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999923:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9590109-8DFC-4E78-B678-8456A0621C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999924:*:*:*:*:*:*:*",
              "matchCriteriaId": "03FD1031-0C3D-45F1-BFD9-823C6D4B69F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999925:*:*:*:*:*:*:*",
              "matchCriteriaId": "44059C1E-CDC6-4B75-92CC-CD45C5063F9D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "Mojolicious antes de v0.999927 no aplica adecuadamente las sumas de comprobaci\u00f3n HMAC - MD5, lo cual tiene un impacto sin especificar y vectores de ataque remotos"
    }
  ],
  "id": "CVE-2010-4803",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-05-03T00:55:00.997",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2239"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-05-03 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
mojolicious mojolicious *
mojolicious mojolicious 0.2
mojolicious mojolicious 0.3
mojolicious mojolicious 0.4
mojolicious mojolicious 0.5
mojolicious mojolicious 0.6
mojolicious mojolicious 0.7
mojolicious mojolicious 0.8
mojolicious mojolicious 0.8.1
mojolicious mojolicious 0.8.2
mojolicious mojolicious 0.8.3
mojolicious mojolicious 0.8.4
mojolicious mojolicious 0.8.5
mojolicious mojolicious 0.9
mojolicious mojolicious 0.8006
mojolicious mojolicious 0.8007
mojolicious mojolicious 0.8008
mojolicious mojolicious 0.8009
mojolicious mojolicious 0.9001
mojolicious mojolicious 0.9002
mojolicious mojolicious 0.991231
mojolicious mojolicious 0.991232
mojolicious mojolicious 0.991233
mojolicious mojolicious 0.991234
mojolicious mojolicious 0.991235
mojolicious mojolicious 0.991236
mojolicious mojolicious 0.991237
mojolicious mojolicious 0.991238
mojolicious mojolicious 0.991239
mojolicious mojolicious 0.991240
mojolicious mojolicious 0.991241
mojolicious mojolicious 0.991242
mojolicious mojolicious 0.991243
mojolicious mojolicious 0.991244
mojolicious mojolicious 0.991245
mojolicious mojolicious 0.991246
mojolicious mojolicious 0.991250
mojolicious mojolicious 0.991251
mojolicious mojolicious 0.999901
mojolicious mojolicious 0.999902
mojolicious mojolicious 0.999903
mojolicious mojolicious 0.999904
mojolicious mojolicious 0.999905
mojolicious mojolicious 0.999906
mojolicious mojolicious 0.999907
mojolicious mojolicious 0.999908
mojolicious mojolicious 0.999909
mojolicious mojolicious 0.999910
mojolicious mojolicious 0.999911
mojolicious mojolicious 0.999912
mojolicious mojolicious 0.999913
mojolicious mojolicious 0.999914
mojolicious mojolicious 0.999920
mojolicious mojolicious 0.999921
mojolicious mojolicious 0.999922
mojolicious mojolicious 0.999923
mojolicious mojolicious 0.999924
mojolicious mojolicious 0.999925
mojolicious mojolicious 0.999926
mojolicious mojolicious 0.999927
mojolicious mojolicious 0.999928
mojolicious mojolicious 0.999929
mojolicious mojolicious 0.999930
mojolicious mojolicious 0.999931
mojolicious mojolicious 0.999932
mojolicious mojolicious 0.999933
mojolicious mojolicious 0.999934
mojolicious mojolicious 0.999935
mojolicious mojolicious 0.999936
mojolicious mojolicious 0.999937
mojolicious mojolicious 0.999938
mojolicious mojolicious 0.999939
mojolicious mojolicious 0.999940
mojolicious mojolicious 0.999941
mojolicious mojolicious 0.999950
mojolicious mojolicious 1.0
mojolicious mojolicious 1.1
mojolicious mojolicious 1.01



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2175D9E0-1851-4C06-85F5-A316C80F6C1A",
              "versionEndIncluding": "1.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "083A2DA9-38BB-4AF8-9FF0-41101E830A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C11EC7-D91E-4F65-9C8A-801C724EDBBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33620B-2B78-4221-8067-15E8BC56865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AC00B5-717B-4F7F-AD25-9754BEFD7221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2E2469A-BE25-4D18-8E7D-F709DCB86FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "02BB8742-9D5C-4831-BD2F-A24505B8E4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CA1476-123D-44D5-A1E8-D9C58F6D9949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "479781F2-9614-4552-AE39-12AC41ABB3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D1279D-333D-4338-B4ED-07BB1900FB0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D21184D-8823-4162-961D-8A7856557786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "538FC292-B6BF-4551-AE44-259E0B61B680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "574F7A7C-3986-401D-A58F-6C8F7D922002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDACD094-8117-460E-B7D1-E63EC00B97A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8006:*:*:*:*:*:*:*",
              "matchCriteriaId": "6965DAA1-FDD8-484B-873A-F6D13227FAD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8007:*:*:*:*:*:*:*",
              "matchCriteriaId": "9865E142-BB29-4718-BD85-F40E185BF31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8008:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F667C15-3C89-49CD-800D-303A2677FC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8009:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B301544-A38F-417C-BB94-E7711F8ED7C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9001:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADEBDEB2-3070-4633-A934-DDF49CBD10C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9002:*:*:*:*:*:*:*",
              "matchCriteriaId": "5875A25D-CC0E-43CF-B617-CEA99C65A52A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991231:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8C04B9B-DEA3-4161-8E6C-BBBBE9AF5444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991232:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5F9699-7B1B-4356-B0EB-C942888AFEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991233:*:*:*:*:*:*:*",
              "matchCriteriaId": "A041B8EB-AD9E-452B-9A2E-22DBCD5CB091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991234:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE7A136-3975-400A-AB77-4BCD4669553A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991235:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE628F19-D7C9-4E6D-BDC4-5C82CDE540E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991236:*:*:*:*:*:*:*",
              "matchCriteriaId": "26803A52-EAEC-4CD6-BB89-F1EF40B3021F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991237:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BC4454-3168-420B-9136-21FD18571526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991238:*:*:*:*:*:*:*",
              "matchCriteriaId": "A346280F-BA80-4FBA-BD15-6CA7A1ED8D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991239:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0376F10-8493-498D-9B5D-76AFE0F4417A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991240:*:*:*:*:*:*:*",
              "matchCriteriaId": "69293BBF-7788-4462-AA6F-9D3A084D1B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991241:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F30FA3-69EC-45B3-8AF5-852DB73756A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991242:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88557E4-C793-4F6A-A3AE-07799B212ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991243:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F88C231-60FE-42F3-87E9-23E88ADC7650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991244:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD65F43C-98A9-46A1-BCC4-79ACB5F5C6B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991245:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A9F1C7-1C0A-42B1-91D3-676E03E64BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991246:*:*:*:*:*:*:*",
              "matchCriteriaId": "A886B4DC-30E9-4C41-A79A-96F309F343F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991250:*:*:*:*:*:*:*",
              "matchCriteriaId": "C28AEC3C-20F0-4BFB-B7B6-30336C631400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991251:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0521BF-A66D-4663-83C6-49E650454ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999901:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C95BB3D-774C-4C71-9A3A-15938BA5CF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999902:*:*:*:*:*:*:*",
              "matchCriteriaId": "B583B413-4B8E-4FA3-9CD1-A650CEAB9449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999903:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC7A6F1-BD38-4119-B5A7-56A50EC6C9C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999904:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DEFF843-57F4-4553-ABD3-7269A32A6DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999905:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8A7C4E6-5E3E-43CB-8F54-4AA5563EA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999906:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CB9879-D8B4-45CA-BF63-D4681C403818",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999907:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EE203A-CFB1-4317-879D-E6A44F063F66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999908:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7978FDA-7622-4041-BE9E-28F99A1FB16E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999909:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0975B5B-5409-42F5-A50F-644A80F3E5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999910:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AB9069-49F9-43B5-9F0F-04BBB145FD7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999911:*:*:*:*:*:*:*",
              "matchCriteriaId": "77CA7A3A-254D-4154-8AFB-FA7BC4EB286A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999912:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA8D9CE-BD9E-4BD2-B38C-909CCE0D3842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999913:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DABFC81-F44C-46AB-B9CD-D35624F5071A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999914:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8BDB83-641B-4858-B00A-EEFC9F583050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999920:*:*:*:*:*:*:*",
              "matchCriteriaId": "D010713B-DE3E-4E76-8299-FF50D19ADA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999921:*:*:*:*:*:*:*",
              "matchCriteriaId": "92B83ECE-5D7C-417D-9957-976ECE8E2308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999922:*:*:*:*:*:*:*",
              "matchCriteriaId": "59E2E6AF-11DD-4C51-A84F-129D160ACAFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999923:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9590109-8DFC-4E78-B678-8456A0621C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999924:*:*:*:*:*:*:*",
              "matchCriteriaId": "03FD1031-0C3D-45F1-BFD9-823C6D4B69F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999925:*:*:*:*:*:*:*",
              "matchCriteriaId": "44059C1E-CDC6-4B75-92CC-CD45C5063F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999926:*:*:*:*:*:*:*",
              "matchCriteriaId": "6278FC7E-6852-46B1-9F38-58847391B2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999927:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FDE0AA-B353-4CD8-BC9D-DFC709031FF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999928:*:*:*:*:*:*:*",
              "matchCriteriaId": "CABDE1E8-17E9-4EF5-91C7-9688B0F49AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999929:*:*:*:*:*:*:*",
              "matchCriteriaId": "66454D2F-C566-4F3D-AF78-C3FE75A6C62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999930:*:*:*:*:*:*:*",
              "matchCriteriaId": "83E28BE4-60FE-46E9-8AA4-45B14A34E2CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999931:*:*:*:*:*:*:*",
              "matchCriteriaId": "914475F6-3C2F-4D15-8017-588763BF37E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999932:*:*:*:*:*:*:*",
              "matchCriteriaId": "12806A34-36FA-4B19-B84E-7385A8EDB302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999933:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAB41DB0-C61F-441F-A8C7-624845EE39ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999934:*:*:*:*:*:*:*",
              "matchCriteriaId": "3762061D-FCC3-43EE-BC73-1BEF6BBC8980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999935:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE3BAE8-B78E-490E-90A7-8DF957D9CA7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999936:*:*:*:*:*:*:*",
              "matchCriteriaId": "C347C9AE-D2AA-4440-B506-1B692C7C52CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999937:*:*:*:*:*:*:*",
              "matchCriteriaId": "62704DAC-BFE8-4D27-9F2E-FB8D70E43063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999938:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C3E1157-11FB-45FA-8E4A-53A3614B335D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999939:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9674613-3BDB-471E-A109-83FF1463FCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999940:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB59D0D0-E453-4700-9A96-9A452E5C90E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999941:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A3B80D-8BD9-4F01-AAA8-B50CB3084E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999950:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCB14A8-635D-4652-9F76-E718F60D0FC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD46D41-AE54-4223-A659-7E21EC0EC6A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "393D68B4-0E53-4973-80FF-F57CC470E16B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "151552D1-9D07-4424-863B-FC1948619799",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la ayuda de link_to en Mojolicious en versiones anteriores a v1.12 , permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de par\u00e1metros sin especificar\r\n"
    }
  ],
  "id": "CVE-2011-1841",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-05-03T00:55:01.030",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2239"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/47713"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/47713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67257"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-05-03 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.
Impacted products
Vendor Product Version
mojolicious mojolicious *
mojolicious mojolicious 0.2
mojolicious mojolicious 0.3
mojolicious mojolicious 0.4
mojolicious mojolicious 0.5
mojolicious mojolicious 0.6
mojolicious mojolicious 0.7
mojolicious mojolicious 0.8
mojolicious mojolicious 0.8.1
mojolicious mojolicious 0.8.2
mojolicious mojolicious 0.8.3
mojolicious mojolicious 0.8.4
mojolicious mojolicious 0.8.5
mojolicious mojolicious 0.9
mojolicious mojolicious 0.8006
mojolicious mojolicious 0.8007
mojolicious mojolicious 0.8008
mojolicious mojolicious 0.8009
mojolicious mojolicious 0.9001
mojolicious mojolicious 0.9002
mojolicious mojolicious 0.991231
mojolicious mojolicious 0.991232
mojolicious mojolicious 0.991233
mojolicious mojolicious 0.991234
mojolicious mojolicious 0.991235
mojolicious mojolicious 0.991236
mojolicious mojolicious 0.991237
mojolicious mojolicious 0.991238
mojolicious mojolicious 0.991239
mojolicious mojolicious 0.991240
mojolicious mojolicious 0.991241
mojolicious mojolicious 0.991242
mojolicious mojolicious 0.991243
mojolicious mojolicious 0.991244
mojolicious mojolicious 0.991245
mojolicious mojolicious 0.991246
mojolicious mojolicious 0.991250
mojolicious mojolicious 0.991251
mojolicious mojolicious 0.999901
mojolicious mojolicious 0.999902
mojolicious mojolicious 0.999903
mojolicious mojolicious 0.999904
mojolicious mojolicious 0.999905
mojolicious mojolicious 0.999906
mojolicious mojolicious 0.999907
mojolicious mojolicious 0.999908
mojolicious mojolicious 0.999909
mojolicious mojolicious 0.999910
mojolicious mojolicious 0.999911
mojolicious mojolicious 0.999912
mojolicious mojolicious 0.999913
mojolicious mojolicious 0.999914
mojolicious mojolicious 0.999920
mojolicious mojolicious 0.999921
mojolicious mojolicious 0.999922
mojolicious mojolicious 0.999923
mojolicious mojolicious 0.999924
mojolicious mojolicious 0.999925
mojolicious mojolicious 0.999926



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F470698D-3499-4C75-B4CE-FAA0E7BCE5D7",
              "versionEndIncluding": "0.999927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "083A2DA9-38BB-4AF8-9FF0-41101E830A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C11EC7-D91E-4F65-9C8A-801C724EDBBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33620B-2B78-4221-8067-15E8BC56865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AC00B5-717B-4F7F-AD25-9754BEFD7221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2E2469A-BE25-4D18-8E7D-F709DCB86FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "02BB8742-9D5C-4831-BD2F-A24505B8E4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CA1476-123D-44D5-A1E8-D9C58F6D9949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "479781F2-9614-4552-AE39-12AC41ABB3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D1279D-333D-4338-B4ED-07BB1900FB0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D21184D-8823-4162-961D-8A7856557786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "538FC292-B6BF-4551-AE44-259E0B61B680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "574F7A7C-3986-401D-A58F-6C8F7D922002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDACD094-8117-460E-B7D1-E63EC00B97A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8006:*:*:*:*:*:*:*",
              "matchCriteriaId": "6965DAA1-FDD8-484B-873A-F6D13227FAD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8007:*:*:*:*:*:*:*",
              "matchCriteriaId": "9865E142-BB29-4718-BD85-F40E185BF31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8008:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F667C15-3C89-49CD-800D-303A2677FC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.8009:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B301544-A38F-417C-BB94-E7711F8ED7C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9001:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADEBDEB2-3070-4633-A934-DDF49CBD10C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.9002:*:*:*:*:*:*:*",
              "matchCriteriaId": "5875A25D-CC0E-43CF-B617-CEA99C65A52A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991231:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8C04B9B-DEA3-4161-8E6C-BBBBE9AF5444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991232:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5F9699-7B1B-4356-B0EB-C942888AFEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991233:*:*:*:*:*:*:*",
              "matchCriteriaId": "A041B8EB-AD9E-452B-9A2E-22DBCD5CB091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991234:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE7A136-3975-400A-AB77-4BCD4669553A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991235:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE628F19-D7C9-4E6D-BDC4-5C82CDE540E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991236:*:*:*:*:*:*:*",
              "matchCriteriaId": "26803A52-EAEC-4CD6-BB89-F1EF40B3021F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991237:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BC4454-3168-420B-9136-21FD18571526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991238:*:*:*:*:*:*:*",
              "matchCriteriaId": "A346280F-BA80-4FBA-BD15-6CA7A1ED8D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991239:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0376F10-8493-498D-9B5D-76AFE0F4417A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991240:*:*:*:*:*:*:*",
              "matchCriteriaId": "69293BBF-7788-4462-AA6F-9D3A084D1B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991241:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F30FA3-69EC-45B3-8AF5-852DB73756A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991242:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88557E4-C793-4F6A-A3AE-07799B212ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991243:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F88C231-60FE-42F3-87E9-23E88ADC7650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991244:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD65F43C-98A9-46A1-BCC4-79ACB5F5C6B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991245:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A9F1C7-1C0A-42B1-91D3-676E03E64BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991246:*:*:*:*:*:*:*",
              "matchCriteriaId": "A886B4DC-30E9-4C41-A79A-96F309F343F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991250:*:*:*:*:*:*:*",
              "matchCriteriaId": "C28AEC3C-20F0-4BFB-B7B6-30336C631400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.991251:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0521BF-A66D-4663-83C6-49E650454ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999901:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C95BB3D-774C-4C71-9A3A-15938BA5CF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999902:*:*:*:*:*:*:*",
              "matchCriteriaId": "B583B413-4B8E-4FA3-9CD1-A650CEAB9449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999903:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC7A6F1-BD38-4119-B5A7-56A50EC6C9C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999904:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DEFF843-57F4-4553-ABD3-7269A32A6DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999905:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8A7C4E6-5E3E-43CB-8F54-4AA5563EA98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999906:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CB9879-D8B4-45CA-BF63-D4681C403818",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999907:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EE203A-CFB1-4317-879D-E6A44F063F66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999908:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7978FDA-7622-4041-BE9E-28F99A1FB16E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999909:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0975B5B-5409-42F5-A50F-644A80F3E5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999910:*:*:*:*:*:*:*",
              "matchCriteriaId": "69AB9069-49F9-43B5-9F0F-04BBB145FD7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999911:*:*:*:*:*:*:*",
              "matchCriteriaId": "77CA7A3A-254D-4154-8AFB-FA7BC4EB286A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999912:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA8D9CE-BD9E-4BD2-B38C-909CCE0D3842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999913:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DABFC81-F44C-46AB-B9CD-D35624F5071A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999914:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8BDB83-641B-4858-B00A-EEFC9F583050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999920:*:*:*:*:*:*:*",
              "matchCriteriaId": "D010713B-DE3E-4E76-8299-FF50D19ADA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999921:*:*:*:*:*:*:*",
              "matchCriteriaId": "92B83ECE-5D7C-417D-9957-976ECE8E2308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999922:*:*:*:*:*:*:*",
              "matchCriteriaId": "59E2E6AF-11DD-4C51-A84F-129D160ACAFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999923:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9590109-8DFC-4E78-B678-8456A0621C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999924:*:*:*:*:*:*:*",
              "matchCriteriaId": "03FD1031-0C3D-45F1-BFD9-823C6D4B69F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999925:*:*:*:*:*:*:*",
              "matchCriteriaId": "44059C1E-CDC6-4B75-92CC-CD45C5063F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mojolicious:mojolicious:0.999926:*:*:*:*:*:*:*",
              "matchCriteriaId": "6278FC7E-6852-46B1-9F38-58847391B2F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "Commands.pm en Mojolicious en versiones anteriores a v0.999928 no realiza una detecci\u00f3n adecuada de entornos CGI, lo cual tiene un impacto no especificado y vectores de ataque remoto."
    }
  ],
  "id": "CVE-2010-4802",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-05-03T00:55:00.950",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2239"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2024-58135 (GCVE-0-2024-58135)
Vulnerability from cvelistv5
Published
2025-05-03 10:16
Modified
2025-05-12 18:11
CWE
  • CWE-338 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Summary
Mojolicious versions from 7.28 through 9.40 for Perl may generate weak HMAC session secrets. When creating a default app with the "mojo generate app" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.
Impacted products
Vendor Product Version
SRI Mojolicious Version: 7.28   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-58135",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-05T17:58:51.652027Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-338",
                "description": "CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-07T19:06:35.967Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://cpan.org/modules",
          "defaultStatus": "unaffected",
          "packageName": "Mojolicious",
          "product": "Mojolicious",
          "programFiles": [
            "lib/Mojolicious/Command/Author/generate/app.pm",
            "lib/Mojo/Util.pm",
            "lib/Mojolicious/Command/generate/app.pm"
          ],
          "programRoutines": [
            {
              "name": "Mojolicious::Command::Author::generate::app::run()"
            },
            {
              "name": "Mojo::Util::generate_secret()"
            }
          ],
          "repo": "https://github.com/mojolicious/mojo",
          "vendor": "SRI",
          "versions": [
            {
              "lessThanOrEqual": "9.40",
              "status": "affected",
              "version": "7.28",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Mojolicious versions from 7.28 through 9.40 for Perl may generate weak HMAC session secrets.\u003cbr\u003e\u003cbr\u003eWhen creating a default app with the \"mojo generate app\" tool, a weak secret is written to the application\u0027s configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application\u0027s sessions. This may allow an attacker to brute force the application\u0027s session keys."
            }
          ],
          "value": "Mojolicious versions from 7.28 through 9.40 for Perl may generate weak HMAC session secrets.\n\nWhen creating a default app with the \"mojo generate app\" tool, a weak secret is written to the application\u0027s configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application\u0027s sessions. This may allow an attacker to brute force the application\u0027s session keys."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-338",
              "description": "CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-12T18:11:07.373Z",
        "orgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
        "shortName": "CPANSec"
      },
      "references": [
        {
          "url": "https://perldoc.perl.org/functions/rand"
        },
        {
          "url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojo/Util.pm#L181"
        },
        {
          "url": "https://metacpan.org/release/SRI/Mojolicious-9.38/source/lib/Mojolicious/Command/Author/generate/app.pm#L202"
        },
        {
          "url": "https://github.com/mojolicious/mojo/pull/2200"
        },
        {
          "url": "https://metacpan.org/release/SRI/Mojolicious-7.28/source/lib/Mojolicious/Command/generate/app.pm#L220"
        },
        {
          "url": "https://security.metacpan.org/docs/guides/random-data-for-security.html"
        },
        {
          "url": "https://github.com/hashcat/hashcat/pull/4090"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Mojolicious versions from 7.28 through 9.40 for Perl may generate weak HMAC session secrets",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Ensure that your secret, stored in the application\u0027s configuration file, is at least 128 bit of cryptographically secure random data. For example, to generate a 256 bit secret, one could use the output generated by the \"openssl rand -base64 32\" command."
            }
          ],
          "value": "Ensure that your secret, stored in the application\u0027s configuration file, is at least 128 bit of cryptographically secure random data. For example, to generate a 256 bit secret, one could use the output generated by the \"openssl rand -base64 32\" command."
        },
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "As of version 9.39 of Mojolicious, if a CryptX distribution of version 0.080 or later is available in the include path before calling the \"mojo generate app\" tool, then a secure 1024 bit long secret will be generated."
            }
          ],
          "value": "As of version 9.39 of Mojolicious, if a CryptX distribution of version 0.080 or later is available in the include path before calling the \"mojo generate app\" tool, then a secure 1024 bit long secret will be generated."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
    "assignerShortName": "CPANSec",
    "cveId": "CVE-2024-58135",
    "datePublished": "2025-05-03T10:16:10.636Z",
    "dateReserved": "2025-04-07T16:06:37.226Z",
    "dateUpdated": "2025-05-12T18:11:07.373Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1589 (GCVE-0-2011-1589)
Vulnerability from cvelistv5
Published
2011-04-29 22:00
Modified
2024-08-06 22:28
Severity ?
CWE
  • n/a
Summary
Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.
References
http://perlninja.posterous.com/sharks-in-the-water x_refsource_MISC
http://www.debian.org/security/2011/dsa-2221 vendor-advisory, x_refsource_DEBIAN
http://search.cpan.org/CPAN/authors/id/K/KR/KRAIH/Mojolicious-1.16.tar.gz x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/1072 vdb-entry, x_refsource_VUPEN
https://github.com/kraih/mojo/issues/114 x_refsource_CONFIRM
http://openwall.com/lists/oss-security/2011/04/18/7 mailing-list, x_refsource_MLIST
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058891.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/44359 third-party-advisory, x_refsource_SECUNIA
https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818 x_refsource_CONFIRM
http://secunia.com/advisories/44051 third-party-advisory, x_refsource_SECUNIA
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952 x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/1093 vdb-entry, x_refsource_VUPEN
http://www.osvdb.org/71850 vdb-entry, x_refsource_OSVDB
http://openwall.com/lists/oss-security/2011/04/17/1 mailing-list, x_refsource_MLIST
http://www.securityfocus.com/bid/47402 vdb-entry, x_refsource_BID
http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.16/Changes x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/66830 vdb-entry, x_refsource_XF
http://openwall.com/lists/oss-security/2011/04/18/3 mailing-list, x_refsource_MLIST
https://bugzilla.redhat.com/show_bug.cgi?id=697229 x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058885.html vendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.971Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://perlninja.posterous.com/sharks-in-the-water"
          },
          {
            "name": "DSA-2221",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2221"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://search.cpan.org/CPAN/authors/id/K/KR/KRAIH/Mojolicious-1.16.tar.gz"
          },
          {
            "name": "ADV-2011-1072",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/1072"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/kraih/mojo/issues/114"
          },
          {
            "name": "[oss-security] 20110418 Re: CVE request: Mojolicious directory traversal vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/04/18/7"
          },
          {
            "name": "FEDORA-2011-5505",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058891.html"
          },
          {
            "name": "44359",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44359"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818"
          },
          {
            "name": "44051",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44051"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
          },
          {
            "name": "ADV-2011-1093",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/1093"
          },
          {
            "name": "71850",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/71850"
          },
          {
            "name": "[oss-security] 20110416 CVE request: Mojolicious directory traversal vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/04/17/1"
          },
          {
            "name": "47402",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47402"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.16/Changes"
          },
          {
            "name": "mojolicious-url-directory-traversal(66830)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66830"
          },
          {
            "name": "[oss-security] 20110418 CVE request: Mojolicious",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/04/18/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697229"
          },
          {
            "name": "FEDORA-2011-5504",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058885.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://perlninja.posterous.com/sharks-in-the-water"
        },
        {
          "name": "DSA-2221",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2221"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://search.cpan.org/CPAN/authors/id/K/KR/KRAIH/Mojolicious-1.16.tar.gz"
        },
        {
          "name": "ADV-2011-1072",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/1072"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/kraih/mojo/issues/114"
        },
        {
          "name": "[oss-security] 20110418 Re: CVE request: Mojolicious directory traversal vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/04/18/7"
        },
        {
          "name": "FEDORA-2011-5505",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058891.html"
        },
        {
          "name": "44359",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44359"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818"
        },
        {
          "name": "44051",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44051"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
        },
        {
          "name": "ADV-2011-1093",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/1093"
        },
        {
          "name": "71850",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/71850"
        },
        {
          "name": "[oss-security] 20110416 CVE request: Mojolicious directory traversal vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/04/17/1"
        },
        {
          "name": "47402",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47402"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.16/Changes"
        },
        {
          "name": "mojolicious-url-directory-traversal(66830)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66830"
        },
        {
          "name": "[oss-security] 20110418 CVE request: Mojolicious",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/04/18/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697229"
        },
        {
          "name": "FEDORA-2011-5504",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058885.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1589",
    "datePublished": "2011-04-29T22:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:28:41.971Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5074 (GCVE-0-2009-5074)
Vulnerability from cvelistv5
Published
2011-05-03 00:03
Modified
2024-09-16 22:25
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in the MojoX::Dispatcher::Static implementation in Mojolicious before 0.991250 has unknown impact and attack vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:54.037Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MojoX::Dispatcher::Static implementation in Mojolicious before 0.991250 has unknown impact and attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-05-03T00:03:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5074",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MojoX::Dispatcher::Static implementation in Mojolicious before 0.991250 has unknown impact and attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes",
              "refsource": "CONFIRM",
              "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5074",
    "datePublished": "2011-05-03T00:03:00Z",
    "dateReserved": "2011-05-02T00:00:00Z",
    "dateUpdated": "2024-09-16T22:25:37.859Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1841 (GCVE-0-2011-1841)
Vulnerability from cvelistv5
Published
2011-05-03 00:03
Modified
2024-08-06 22:37
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.850Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
          },
          {
            "name": "mojolicious-linktohelper-xss(67257)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67257"
          },
          {
            "name": "47713",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47713"
          },
          {
            "name": "DSA-2239",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2239"
          },
          {
            "name": "FEDORA-2011-6465",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
        },
        {
          "name": "mojolicious-linktohelper-xss(67257)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67257"
        },
        {
          "name": "47713",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47713"
        },
        {
          "name": "DSA-2239",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2239"
        },
        {
          "name": "FEDORA-2011-6465",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1841",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes",
              "refsource": "CONFIRM",
              "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
            },
            {
              "name": "mojolicious-linktohelper-xss(67257)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67257"
            },
            {
              "name": "47713",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47713"
            },
            {
              "name": "DSA-2239",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2239"
            },
            {
              "name": "FEDORA-2011-6465",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1841",
    "datePublished": "2011-05-03T00:03:00",
    "dateReserved": "2011-05-02T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.850Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4802 (GCVE-0-2010-4802)
Vulnerability from cvelistv5
Published
2011-05-03 00:03
Modified
2024-08-07 04:02
Severity ?
CWE
  • n/a
Summary
Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:02:29.039Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
          },
          {
            "name": "DSA-2239",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2239"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-08-27T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
        },
        {
          "name": "DSA-2239",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2239"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4802",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes",
              "refsource": "CONFIRM",
              "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
            },
            {
              "name": "https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a",
              "refsource": "CONFIRM",
              "url": "https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a"
            },
            {
              "name": "https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44",
              "refsource": "CONFIRM",
              "url": "https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
            },
            {
              "name": "DSA-2239",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2239"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4802",
    "datePublished": "2011-05-03T00:03:00",
    "dateReserved": "2011-05-02T00:00:00",
    "dateUpdated": "2024-08-07T04:02:29.039Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-47208 (GCVE-0-2021-47208)
Vulnerability from cvelistv5
Published
2024-04-07 00:00
Modified
2025-03-20 14:00
CWE
  • n/a
Summary
The Mojolicious module before 9.11 for Perl has a bug in format detection that can potentially be exploited for denial of service.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mojolicious",
            "vendor": "mojolicious",
            "versions": [
              {
                "lessThan": "9.11",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "LOW",
              "baseScore": 4.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-47208",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-16T19:38:01.587080Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-400",
                "description": "CWE-400 Uncontrolled Resource Consumption",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-20T14:00:47.662Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:32:07.220Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/mojolicious/mojo/issues/1736"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/mojolicious/mojo/commit/a0c4576ffb11c235088550de9ba7ac4196e1953c"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Mojolicious module before 9.11 for Perl has a bug in format detection that can potentially be exploited for denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-07T23:58:13.405Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/mojolicious/mojo/issues/1736"
        },
        {
          "url": "https://github.com/mojolicious/mojo/commit/a0c4576ffb11c235088550de9ba7ac4196e1953c"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-47208",
    "datePublished": "2024-04-07T00:00:00.000Z",
    "dateReserved": "2024-04-07T00:00:00.000Z",
    "dateUpdated": "2025-03-20T14:00:47.662Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4803 (GCVE-0-2010-4803)
Vulnerability from cvelistv5
Published
2011-05-03 00:03
Modified
2024-08-07 04:02
Severity ?
CWE
  • n/a
Summary
Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:02:29.557Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
          },
          {
            "name": "DSA-2239",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2239"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-08-27T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
        },
        {
          "name": "DSA-2239",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2239"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4803",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes",
              "refsource": "CONFIRM",
              "url": "http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952"
            },
            {
              "name": "DSA-2239",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2239"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4803",
    "datePublished": "2011-05-03T00:03:00",
    "dateReserved": "2011-05-02T00:00:00",
    "dateUpdated": "2024-08-07T04:02:29.557Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-58134 (GCVE-0-2024-58134)
Vulnerability from cvelistv5
Published
2025-05-03 16:08
Modified
2025-05-12 18:10
CWE
  • CWE-321 - Use of Hard-coded Cryptographic Key
  • CWE-331 - Insufficient Entropy
Summary
Mojolicious versions from 0.999922 through 9.40 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.
Impacted products
Vendor Product Version
SRI Mojolicious Version: 0.999922   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 8.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-58134",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-12T15:57:49.444238Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-12T16:00:28.464Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://cpan.org/modules",
          "defaultStatus": "unaffected",
          "packageName": "Mojolicious",
          "product": "Mojolicious",
          "programFiles": [
            "lib/Mojolicious.pm"
          ],
          "programRoutines": [
            {
              "name": "secrets()"
            }
          ],
          "repo": "https://github.com/mojolicious/mojo",
          "vendor": "SRI",
          "versions": [
            {
              "lessThanOrEqual": "9.40",
              "status": "affected",
              "version": "0.999922",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "analyst",
          "value": "Antoine Cervoise from Synacktiv"
        },
        {
          "lang": "en",
          "type": "analyst",
          "value": "Jakub Kramarz"
        },
        {
          "lang": "en",
          "type": "analyst",
          "value": "Lukas Atkinson"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Mojolicious versions from 0.999922 through 9.40 for Perl uses a hard coded string, or the application\u0027s class name, as a HMAC session secret by default.\u003cbr\u003e\u003cbr\u003eThese predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user\u2019s session.\u003cbr\u003e"
            }
          ],
          "value": "Mojolicious versions from 0.999922 through 9.40 for Perl uses a hard coded string, or the application\u0027s class name, as a HMAC session secret by default.\n\nThese predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user\u2019s session."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-321",
              "description": "CWE-321 Use of Hard-coded Cryptographic Key",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-331",
              "description": "CWE-331 Insufficient Entropy",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-12T18:10:58.672Z",
        "orgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
        "shortName": "CPANSec"
      },
      "references": [
        {
          "url": "https://github.com/mojolicious/mojo/pull/1791"
        },
        {
          "url": "https://github.com/mojolicious/mojo/pull/2200"
        },
        {
          "url": "https://www.synacktiv.com/publications/baking-mojolicious-cookies"
        },
        {
          "url": "https://medium.com/securing/baking-mojolicious-cookies-revisited-a-case-study-of-solving-security-problems-through-security-by-13da7c225802"
        },
        {
          "url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojolicious.pm#L51"
        },
        {
          "url": "https://github.com/hashcat/hashcat/pull/4090"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Mojolicious versions from 0.999922 through 9.40 for Perl uses a hard coded string, or the application\u0027s class name, as a HMAC session secret by default",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Ensure that your Mojolicious application uses a unique secret of at least 128 bit of cryptographically secure random data. For example, to generate a 256 bit secret, one could use the output generated by the \"openssl rand -base64 32\" command.\u003cbr\u003e"
            }
          ],
          "value": "Ensure that your Mojolicious application uses a unique secret of at least 128 bit of cryptographically secure random data. For example, to generate a 256 bit secret, one could use the output generated by the \"openssl rand -base64 32\" command."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
    "assignerShortName": "CPANSec",
    "cveId": "CVE-2024-58134",
    "datePublished": "2025-05-03T16:08:55.042Z",
    "dateReserved": "2025-04-07T16:06:37.226Z",
    "dateUpdated": "2025-05-12T18:10:58.672Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}