Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2009-4151

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-02 Dec, 2009 | 16:00
Updated At-07 Aug, 2024 | 06:54
Rejected At-
Credits

Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages "HTTP access to the RT server," a related issue to CVE-2009-3585.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:02 Dec, 2009 | 16:00
Updated At:07 Aug, 2024 | 06:54
Rejected At:
▼CVE Numbering Authority (CNA)

Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages "HTTP access to the RT server," a related issue to CVE-2009-3585.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html
mailing-list
x_refsource_MLIST
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
vendor-advisory
x_refsource_FEDORA
http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
x_refsource_CONFIRM
http://secunia.com/advisories/37546
third-party-advisory
x_refsource_SECUNIA
http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
vdb-entry
x_refsource_XF
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html
mailing-list
x_refsource_MLIST
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
vendor-advisory
x_refsource_FEDORA
http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
x_refsource_CONFIRM
http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
x_refsource_CONFIRM
http://secunia.com/advisories/37728
third-party-advisory
x_refsource_SECUNIA
http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
vendor-advisory
x_refsource_FEDORA
http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
x_refsource_CONFIRM
http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
x_refsource_CONFIRM
http://www.securityfocus.com/bid/37162
vdb-entry
x_refsource_BID
Hyperlink: http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/37546
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
Resource:
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
Resource:
x_refsource_CONFIRM
Hyperlink: http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/37728
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/37162
Resource:
vdb-entry
x_refsource_BID
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html
mailing-list
x_refsource_MLIST
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/37546
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
x_refsource_CONFIRM
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
vdb-entry
x_refsource_XF
x_transferred
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html
mailing-list
x_refsource_MLIST
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
x_refsource_CONFIRM
x_transferred
http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/37728
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
x_refsource_CONFIRM
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
x_refsource_CONFIRM
x_transferred
http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/37162
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/37546
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/37728
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/37162
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:02 Dec, 2009 | 16:30
Updated At:17 Aug, 2017 | 01:31

Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages "HTTP access to the RT server," a related issue to CVE-2009-3585.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
Type: Primary
Version: 2.0
Base score: 5.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
CPE Matches

Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.1
cpe:2.3:a:bestpractical:rt:3.0.1:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.2
cpe:2.3:a:bestpractical:rt:3.0.2:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.3
cpe:2.3:a:bestpractical:rt:3.0.3:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.4
cpe:2.3:a:bestpractical:rt:3.0.4:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.5
cpe:2.3:a:bestpractical:rt:3.0.5:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.6
cpe:2.3:a:bestpractical:rt:3.0.6:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.7
cpe:2.3:a:bestpractical:rt:3.0.7:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.7.1
cpe:2.3:a:bestpractical:rt:3.0.7.1:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.8
cpe:2.3:a:bestpractical:rt:3.0.8:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.9
cpe:2.3:a:bestpractical:rt:3.0.9:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.10
cpe:2.3:a:bestpractical:rt:3.0.10:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.11
cpe:2.3:a:bestpractical:rt:3.0.11:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.0.12
cpe:2.3:a:bestpractical:rt:3.0.12:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.2.0
cpe:2.3:a:bestpractical:rt:3.2.0:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.2.1
cpe:2.3:a:bestpractical:rt:3.2.1:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.2.2
cpe:2.3:a:bestpractical:rt:3.2.2:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.2.3
cpe:2.3:a:bestpractical:rt:3.2.3:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.4.0
cpe:2.3:a:bestpractical:rt:3.4.0:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.4.1
cpe:2.3:a:bestpractical:rt:3.4.1:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.4.2
cpe:2.3:a:bestpractical:rt:3.4.2:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.4.3
cpe:2.3:a:bestpractical:rt:3.4.3:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.4.4
cpe:2.3:a:bestpractical:rt:3.4.4:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.4.5
cpe:2.3:a:bestpractical:rt:3.4.5:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.4.6
cpe:2.3:a:bestpractical:rt:3.4.6:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.6.0
cpe:2.3:a:bestpractical:rt:3.6.0:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.6.1
cpe:2.3:a:bestpractical:rt:3.6.1:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.6.2
cpe:2.3:a:bestpractical:rt:3.6.2:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.6.3
cpe:2.3:a:bestpractical:rt:3.6.3:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.6.4
cpe:2.3:a:bestpractical:rt:3.6.4:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.6.5
cpe:2.3:a:bestpractical:rt:3.6.5:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.6.6
cpe:2.3:a:bestpractical:rt:3.6.6:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.6.7
cpe:2.3:a:bestpractical:rt:3.6.7:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.6.8
cpe:2.3:a:bestpractical:rt:3.6.8:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.6.9
cpe:2.3:a:bestpractical:rt:3.6.9:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.8.0
cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.8.1
cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.8.2
cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.8.3
cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.8.4
cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*
Best Practical Solutions, LLC
bestpractical
>>rt>>3.8.5
cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patchcve@mitre.org
Patch
http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patchcve@mitre.org
Patch
http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patchcve@mitre.org
Patch
http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patchcve@mitre.org
Patch
http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patchcve@mitre.org
Patch
http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patchcve@mitre.org
Patch
http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.htmlcve@mitre.org
Patch
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.htmlcve@mitre.org
Patch
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.htmlcve@mitre.org
Patch
http://secunia.com/advisories/37546cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/37728cve@mitre.org
N/A
http://www.securityfocus.com/bid/37162cve@mitre.org
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/54472cve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.htmlcve@mitre.org
N/A
Hyperlink: http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://secunia.com/advisories/37546
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/37728
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/37162
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

59Records found

CVE-2017-12195
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 42.04%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 15:00
Updated-05 Aug, 2024 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in all Openshift Enterprise versions using the openshift elasticsearch plugin. An attacker with knowledge of the given name used to authenticate and access Elasticsearch can later access it without the token, bypassing authentication. This attack also requires that the Elasticsearch be configured with an external route, and the data accessed is limited to the indices.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openshift_container_platformOpenShift
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-295
Improper Certificate Validation
CVE-2010-3868
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.28% / 50.77%
||
7 Day CHG~0.00%
Published-17 Nov, 2010 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Red Hat Certificate System (RHCS) 7.3 and 8 and Dogtag Certificate System do not require authentication for requests to decrypt SCEP one-time PINs, which allows remote attackers to obtain PINs by sniffing the network for SCEP requests and then sending decryption requests to the Certificate Authority component.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-dogtag_certificate_systemcertificate_systemn/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-20278
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 37.56%
||
7 Day CHG~0.00%
Published-28 May, 2021 | 10:42
Updated-03 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy `OpenID` is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID `implicit flow` is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication.

Action-Not Available
Vendor-kialin/a
Product-kialikiali
CWE ID-CWE-290
Authentication Bypass by Spoofing
CWE ID-CWE-287
Improper Authentication
CVE-2016-6474
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.3||HIGH
EPSS-0.32% / 53.99%
||
7 Day CHG~0.00%
Published-14 Dec, 2016 | 00:37
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the implementation of X.509 Version 3 for SSH authentication functionality in Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to bypass authentication on an affected system. More Information: CSCuv89417. Known Affected Releases: 15.5(2.25)T. Known Fixed Releases: 15.2(4)E1 15.2(4)E2 15.2(4)E3 15.2(4)EA4 15.2(4.0r)EB 15.2(4.1.27)EB 15.2(4.4.2)EA4 15.2(4.7.1)EC 15.2(4.7.2)EC 15.2(5.1.1)E 15.2(5.5.63)E 15.2(5.5.64)E 15.4(1)IA1.80 15.5(3)M1.1 15.5(3)M2 15.5(3)S1.4 15.5(3)S2 15.6(0.22)S0.12 15.6(1)T0.1 15.6(1)T1 15.6(1.15)T 15.6(1.17)S0.7 15.6(1.17)SP 15.6(1.22.1a)T0 15.6(2)S 15.6(2)SP 16.1(1.24) 16.1.2 16.2(0.247) 16.3(0.11) 3.8(1)E Denali-16.1.2.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosCisco IOS
CWE ID-CWE-287
Improper Authentication
CVE-2016-3085
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.27% / 50.12%
||
7 Day CHG+0.16%
Published-10 Jun, 2016 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache CloudStack 4.5.x before 4.5.2.1, 4.6.x before 4.6.2.1, 4.7.x before 4.7.1.1, and 4.8.x before 4.8.0.1, when SAML-based authentication is enabled and used, allow remote attackers to bypass authentication and access the user interface via vectors related to the SAML plugin.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-cloudstackn/a
CWE ID-CWE-287
Improper Authentication
CVE-2015-7285
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-5.8||MEDIUM
EPSS-0.36% / 57.29%
||
7 Day CHG~0.00%
Published-25 Nov, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 do not require authentication from Alarm Receiving Center (ARC) servers, which allows man-in-the-middle attackers to bypass intended access restrictions via a spoofed HSxx response.

Action-Not Available
Vendor-csl_dualcomn/a
Product-gprsgprs_cs2300-r_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-15222
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.1||HIGH
EPSS-0.12% / 31.21%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 16:15
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Replay of private_key_jwt possible in ORY Fosite

In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.31.0, when using "private_key_jwt" authentication the uniqueness of the `jti` value is not checked. When using client authentication method "private_key_jwt", OpenId specification says the following about assertion `jti`: "A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties". Hydra does not seem to check the uniqueness of this `jti` value. This problem is fixed in version 0.31.0.

Action-Not Available
Vendor-oryory
Product-fositefosite
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-15240
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.4||HIGH
EPSS-0.09% / 25.84%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 17:25
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Regression in JWT Signature Validation

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.

Action-Not Available
Vendor-auth0auth0
Product-omniauth-auth0omniauth-auth0
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2013-0937
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-5.8||MEDIUM
EPSS-0.21% / 42.99%
||
7 Day CHG~0.00%
Published-10 May, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Session fixation vulnerability in EMC Documentum Webtop before 6.7 SP2, Documentum WDK before 6.7 SP2, Documentum Taskspace before 6.7 SP2, and Documentum Records Manager before 6.7 SP2 allows remote attackers to hijack web sessions via unspecified vectors.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-documentum_records_managerdocumentum_wdkdocumentum_webtopdocumentum_taskspacen/a
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • Next
Details not found