Medium severity6.5NVD Advisory· Published Apr 5, 2025· Updated Apr 15, 2026
CVE-2024-56370
CVE-2024-56370
Description
Net::Xero 0.044 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Specifically Net::Xero uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pmnvd
- metacpan.org/release/ELLIOTT/Net-Xero-0.44/source/lib/Net/Xero.pmnvd
- metacpan.org/release/ELLIOTT/Net-Xero-0.44/source/lib/Net/Xero.pmnvd
- perldoc.perl.org/functions/randnvd
- security.metacpan.org/docs/guides/random-data-for-security.htmlnvd
News mentions
0No linked articles in our index yet.