Lucene search

K
cve[email protected]CVE-2006-6969
HistoryFeb 07, 2007 - 11:28 a.m.

CVE-2006-6969

2007-02-0711:28:00
web.nvd.nist.gov
21
jetty
cve-2006-6969
session identifier
java.util.random
brute force attacks
cross-site request forgery
authentication bypass

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.1 High

AI Score

Confidence

Low

0.142 Low

EPSS

Percentile

95.7%

Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks.

Affected configurations

NVD
Node
jettyjetty_http_serverMatch4.2.9
OR
jettyjetty_http_serverMatch4.2.11
OR
jettyjetty_http_serverMatch4.2.12
OR
jettyjetty_http_serverMatch4.2.14
OR
jettyjetty_http_serverMatch4.2.15
OR
jettyjetty_http_serverMatch4.2.16
OR
jettyjetty_http_serverMatch4.2.17
OR
jettyjetty_http_serverMatch4.2.18
OR
jettyjetty_http_serverMatch4.2.19
OR
jettyjetty_http_serverMatch4.2.24
OR
jettyjetty_http_serverMatch5.1.11
OR
jettyjetty_http_serverMatch6.0.1
OR
jettyjetty_http_serverMatch6.1.0_pre2

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.1 High

AI Score

Confidence

Low

0.142 Low

EPSS

Percentile

95.7%

Related for CVE-2006-6969