The administrative web console on the TANDBERG Video Communication Server (VCS) before X4.3 uses predictable session cookies in (1) tandberg/web/lib/secure.php and (2) tandberg/web/user/lib/secure.php, which makes it easier for remote attackers to bypass authentication, and execute arbitrary code by loading a custom software update, via a crafted "Cookie: tandberg_login=" HTTP header.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://ftp.tandberg.com/pub/software/vcs/TANDBERG%20Video%20Communication%20Server%20Software%20Release%20Notes%20%28X4%29.pdf - | |
References | () http://secunia.com/advisories/39275 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/510672/100/0/threaded - | |
References | () http://www.vsecurity.com/resources/advisory/20100409-1 - Patch, Vendor Advisory |
Information
Published : 2010-04-13 17:30
Updated : 2024-11-21 01:09
NVD link : CVE-2009-4509
Mitre link : CVE-2009-4509
CVE.ORG link : CVE-2009-4509
JSON object : View
Products Affected
vsecurity
- tandberg_video_communication_server
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')