The web management interface for Mitel 3300 Integrated Communications Platform (ICP) before 4.2.2.11 generates easily predictable web session IDs, which allows remote attackers to hijack other sessions via the parentsessionid cookie.
References
Link | Resource |
---|---|
http://www.corsaire.com/advisories/c040817-002.txt | Vendor Advisory |
http://www.mitel.com/DocController?documentId=14223 | Patch Vendor Advisory |
http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en | Patch Vendor Advisory |
http://www.corsaire.com/advisories/c040817-002.txt | Vendor Advisory |
http://www.mitel.com/DocController?documentId=14223 | Patch Vendor Advisory |
http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en | Patch Vendor Advisory |
Configurations
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.corsaire.com/advisories/c040817-002.txt - Vendor Advisory | |
References | () http://www.mitel.com/DocController?documentId=14223 - Patch, Vendor Advisory | |
References | () http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en - Patch, Vendor Advisory |
Information
Published : 2004-02-28 05:00
Updated : 2024-11-20 23:49
NVD link : CVE-2004-0944
Mitre link : CVE-2004-0944
CVE.ORG link : CVE-2004-0944
JSON object : View
Products Affected
mitel
- mitel_3300_integrated_communication_platform
CWE