Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2009-5014

Опубликовано: 06 нояб. 2010
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:turbogears:turbogears2:*:*:*:*:*:*:*:*
Версия до 2.1b2 (включая)
cpe:2.3:a:turbogears:turbogears2:1.9.7a2:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:1.9.7a3:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:1.9.7a4:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:1.9.7b1:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:1.9.7b2:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b1:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b2:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b3:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b4:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b5:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b6:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b7:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.1a1:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.1a2:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.1a3:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.1b1:*:*:*:*:*:*:*

EPSS

Процентиль: 53%
0.00304
Низкий

7.5 High

CVSS2

Дефекты

CWE-310

Связанные уязвимости

ubuntu
около 15 лет назад

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

debian
около 15 лет назад

The default quickstart configuration of TurboGears2 (aka tg2) before 2 ...

github
больше 3 лет назад

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

EPSS

Процентиль: 53%
0.00304
Низкий

7.5 High

CVSS2

Дефекты

CWE-310