CVE-2026-47373

Published: Mag 20, 2026 Last Modified: Mag 21, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks.

These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.

208

Observable Timing Discrepancy

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Access Control
Potential Impacts:
Read Application Data Bypass Protection Mechanism
Applicable Platforms
All platforms may be affected
View CWE Details
https://github.com/robrwo/perl-Crypt-SaltedHash/commit/c07bfc5c23185b0667233d0f…
https://metacpan.org/release/RRWO/Crypt-SaltedHash-0.10/changes
http://www.openwall.com/lists/oss-security/2026/05/20/21