CVE-2009-0486
Published Feb 9, 2009
Last updated 16 years ago
Overview
- Description
- Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-352
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF288A74-070E-4EB4-BB92-7D4D41635DD1" } ], "operator": "OR" } ] } ]