| Vulnerability Name: | CVE-2009-4655 (CCN-56613) | ||||||||
| Assigned: | 2009-11-13 | ||||||||
| Published: | 2009-11-13 | ||||||||
| Updated: | 2017-08-17 | ||||||||
| Summary: | The dhost web service in Novell eDirectory 8.8.5 uses a predictable session cookie, which makes it easier for remote attackers to hijack sessions via a modified cookie. | ||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-310 | ||||||||
| Vulnerability Consequences: | Other | ||||||||
| References: | Source: MITRE Type: CNA CVE-2009-4655 Source: OSVDB Type: UNKNOWN 60035 Source: CCN Type: SA38808 Novell eDirectory DHost Predictable Session Identifier Source: MISC Type: Exploit http://www.metasploit.com/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie Source: CCN Type: Metasploit Framework Web site Novell eDirectory DHOST Predictable Session Cookie Source: MISC Type: Exploit http://www.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb Source: CCN Type: Novell Document ID: 34269 History of Issues Resolved in eDirectory 8.8.x Source: CCN Type: OSVDB ID: 60035 Novell eDirectory DHOST Predictable Session Cookie Source: CCN Type: BID-38782 Novell eDirectory DHost Weak Session Cookie Session Hijacking Vulnerability Source: XF Type: UNKNOWN edirectory-dhost-session-hijacking(56613) Source: XF Type: UNKNOWN edirectory-dhost-session-hijacking(56613) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||