Vulnerability Details : CVE-2009-3585
Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages a second web server within the same domain.
Products affected by CVE-2009-3585
- cpe:2.3:a:bestpractical:rt:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:3.6.9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-3585
1.55%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-3585
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2009-3585
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-3585
-
http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
-
http://www.securityfocus.com/bid/37162
-
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
-
http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
-
http://secunia.com/advisories/37546
Vendor Advisory
-
http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
-
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
-
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html
Patch
-
http://secunia.com/advisories/37728
Vendor Advisory
-
http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
-
http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
-
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
-
http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
-
http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
-
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html
Patch
Jump to