Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2009-5014
HistoryOct 03, 2022 - 4:24 p.m.

CVE-2009-5014

2022-10-0316:24:01
Debian Security Bug Tracker
security-tracker.debian.org
10
turbogears2
weak cookie salt
authentication
remote attackers
bypass
repoze.who
forged authorization cookie
cve-2010-3852

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.0%

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.

OSVersionArchitecturePackageVersionFilename
Debian10allturbogears2< 2.0.3-1turbogears2_2.0.3-1_all.deb

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.0%