CVE-2026-2439

Source
https://cve.org/CVERecord?id=CVE-2026-2439
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2439.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-2439
Published
2026-02-16T22:22:41.470Z
Modified
2026-02-20T01:35:57.931274Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generatesessionid function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's built-in rand function. Neither of these methods are secure, and attackers are able to guess session_ids that can grant them access to systems. Specifically,

  • There is no warning when uuidgen fails. The software can be quietly using the fallback rand() function with no warnings if the command fails for any reason.
  • The uuidgen command will generate a time-based UUID if the system does not have a high-quality random number source, because the call does not explicitly specify the --random option. Note that the system time is shared in HTTP responses.
  • UUIDs are identifiers whose mere possession grants access, as per RFC 9562.
  • The output of the built-in rand() function is predictable and unsuitable for security applications.
References

Affected packages

Git / github.com/bwva/concierge-sessions

Affected ranges

Type
GIT
Repo
https://github.com/bwva/concierge-sessions
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2439.json"