CVE-2009-3585

Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages a second web server within the same domain.
References
Link Resource
http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html Patch
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html Patch
http://secunia.com/advisories/37546 Vendor Advisory
http://secunia.com/advisories/37728 Vendor Advisory
http://www.securityfocus.com/bid/37162
https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html Patch
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html Patch
http://secunia.com/advisories/37546 Vendor Advisory
http://secunia.com/advisories/37728 Vendor Advisory
http://www.securityfocus.com/bid/37162
https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bestpractical:rt:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.11:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.12:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.5:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.6:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.5:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.6:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.7:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.8:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.9:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:07

Type Values Removed Values Added
References () http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch - () http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch -
References () http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch - () http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch -
References () http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch - () http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch -
References () http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch - () http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch -
References () http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch - () http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch -
References () http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch - () http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch -
References () http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html - () http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html -
References () http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html - Patch () http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html - Patch
References () http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html - Patch () http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html - Patch
References () http://secunia.com/advisories/37546 - Vendor Advisory () http://secunia.com/advisories/37546 - Vendor Advisory
References () http://secunia.com/advisories/37728 - Vendor Advisory () http://secunia.com/advisories/37728 - Vendor Advisory
References () http://www.securityfocus.com/bid/37162 - () http://www.securityfocus.com/bid/37162 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54472 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/54472 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html - () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html - () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html - () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html -

Information

Published : 2009-12-02 16:30

Updated : 2024-11-21 01:07


NVD link : CVE-2009-3585

Mitre link : CVE-2009-3585

CVE.ORG link : CVE-2009-3585


JSON object : View

Products Affected

bestpractical

  • rt
CWE
CWE-287

Improper Authentication