CVE-2009-5014

The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:turbogears:turbogears2:*:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:1.9.7a2:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:1.9.7a3:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:1.9.7a4:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:1.9.7b1:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:1.9.7b2:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b1:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b2:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b3:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b4:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b5:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b6:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.0b7:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.1a1:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.1a2:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.1a3:*:*:*:*:*:*:*
cpe:2.3:a:turbogears:turbogears2:2.1b1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:10

Type Values Removed Values Added
References () http://groups.google.com/group/turbogears-announce/msg/09ec26696b1761bb?dmode=source&output=gplain - () http://groups.google.com/group/turbogears-announce/msg/09ec26696b1761bb?dmode=source&output=gplain -

Information

Published : 2010-11-06 00:00

Updated : 2024-11-21 01:10


NVD link : CVE-2009-5014

Mitre link : CVE-2009-5014

CVE.ORG link : CVE-2009-5014


JSON object : View

Products Affected

turbogears

  • turbogears2
CWE
CWE-310

Cryptographic Issues