Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/34361 - | |
References | () http://www.bugzilla.org/security/3.0.7/ - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/33581 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html - |
Information
Published : 2009-02-09 17:30
Updated : 2024-11-21 01:00
NVD link : CVE-2009-0486
Mitre link : CVE-2009-0486
CVE.ORG link : CVE-2009-0486
JSON object : View
Products Affected
mozilla
- bugzilla
CWE
CWE-352
Cross-Site Request Forgery (CSRF)