Vulnerability Details CVE-2006-6969
Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 68.0%
CVSS Severity
CVSS v2 Score 6.8
Products affected by CVE-2006-6969
-
cpe:2.3:a:jetty:jetty_http_server:4.2.11
-
cpe:2.3:a:jetty:jetty_http_server:4.2.12
-
cpe:2.3:a:jetty:jetty_http_server:4.2.14
-
cpe:2.3:a:jetty:jetty_http_server:4.2.15
-
cpe:2.3:a:jetty:jetty_http_server:4.2.16
-
cpe:2.3:a:jetty:jetty_http_server:4.2.17
-
cpe:2.3:a:jetty:jetty_http_server:4.2.18
-
cpe:2.3:a:jetty:jetty_http_server:4.2.19
-
cpe:2.3:a:jetty:jetty_http_server:4.2.24
-
cpe:2.3:a:jetty:jetty_http_server:4.2.9
-
cpe:2.3:a:jetty:jetty_http_server:5.1.11
-
cpe:2.3:a:jetty:jetty_http_server:6.0.1
-
cpe:2.3:a:jetty:jetty_http_server:6.1.0_pre2