CVE-2009-5014
06.11.2010, 00:00
The default quickstart configuration of TurboGears2 (aka tg2) before 2.0.2 has a weak cookie salt, which makes it easier for remote attackers to bypass repoze.who authentication via a forged authorization cookie, a related issue to CVE-2010-3852.Enginsight
Vendor | Product | Version |
---|---|---|
turbogears | turbogears2 | 𝑥 ≤ 2.1b2 |
turbogears | turbogears2 | 1.9.7a2:a2 |
turbogears | turbogears2 | 1.9.7a3:a3 |
turbogears | turbogears2 | 1.9.7a4:a4 |
turbogears | turbogears2 | 1.9.7b1:b1 |
turbogears | turbogears2 | 1.9.7b2:b2 |
turbogears | turbogears2 | 2.0:rc1 |
turbogears | turbogears2 | 2.0.1 |
turbogears | turbogears2 | 2.0b1:b1 |
turbogears | turbogears2 | 2.0b2:b2 |
turbogears | turbogears2 | 2.0b3:b3 |
turbogears | turbogears2 | 2.0b4:b4 |
turbogears | turbogears2 | 2.0b5:b5 |
turbogears | turbogears2 | 2.0b6:b6 |
turbogears | turbogears2 | 2.0b7:b7 |
turbogears | turbogears2 | 2.1a1:a1 |
turbogears | turbogears2 | 2.1a2:a2 |
turbogears | turbogears2 | 2.1a3:a3 |
turbogears | turbogears2 | 2.1b1:b1 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration