Vulnerability Details : CVE-2009-0486
Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2009-0486
- cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-0486
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-0486
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2009-0486
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-0486
Jump to