Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T04:40:03.437Z
Reserved: 2009-02-09T00:00:00
Link: CVE-2009-0486

No data.

Status : Modified
Published: 2009-02-09T17:30:00.437
Modified: 2024-11-21T01:00:01.077
Link: CVE-2009-0486
