First published: Tue Sep 15 2009(Updated: )
token.cgi in Bugzilla 3.4rc1 through 3.4.1 places a password in a URL at the beginning of a login session that occurs immediately after a password reset, which allows context-dependent attackers to discover passwords by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Bugzilla | =3.4.1 | |
Mozilla Bugzilla | =3.4 | |
Mozilla Bugzilla | =3.4-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3166 is considered a medium severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2009-3166, upgrade to Bugzilla version 3.4.2 or later, which resolves the issue with password exposure.
CVE-2009-3166 affects Bugzilla versions 3.4rc1, 3.4.0, and 3.4.1.
CVE-2009-3166 allows attackers to potentially discover passwords through web-server access and Referer logs.
No, CVE-2009-3166 is part of a series of vulnerabilities related to password handling in Bugzilla.