CVE-2009-4655

The dhost web service in Novell eDirectory 8.8.5 uses a predictable session cookie, which makes it easier for remote attackers to hijack sessions via a modified cookie.
Configurations

Configuration 1 (hide)

cpe:2.3:a:novell:edirectory:8.8.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:10

Type Values Removed Values Added
References () http://osvdb.org/60035 - () http://osvdb.org/60035 -
References () http://www.metasploit.com/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie - Exploit () http://www.metasploit.com/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie - Exploit
References () http://www.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb - Exploit () http://www.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/56613 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/56613 -

Information

Published : 2010-02-26 18:30

Updated : 2024-11-21 01:10


NVD link : CVE-2009-4655

Mitre link : CVE-2009-4655

CVE.ORG link : CVE-2009-4655


JSON object : View

Products Affected

novell

  • edirectory
CWE
CWE-310

Cryptographic Issues