Vulnerability Description
The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Turbogears | Turbogears2 | <= 2.1b2 |
Related Weaknesses (CWE)
References
- http://groups.google.com/group/turbogears-announce/msg/09ec26696b1761bb?dmode=so
- http://groups.google.com/group/turbogears-announce/msg/09ec26696b1761bb?dmode=so
FAQ
What is CVE-2009-5014?
CVE-2009-5014 is a vulnerability with a CVSS score of 7.5 (HIGH). The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authoriza...
How severe is CVE-2009-5014?
CVE-2009-5014 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-5014?
Check the references section above for vendor advisories and patch information. Affected products include: Turbogears Turbogears2.