Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html | vendor advisory |
http://www.securityfocus.com/bid/33581 | vdb entry |
http://secunia.com/advisories/34361 | third party advisory |
http://www.bugzilla.org/security/3.0.7/ | vendor advisory |