Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2009-0486
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:* |
Yes
|
- | - |