Vulnerabilities > CVE-2009-4655 - Cryptographic Issues vulnerability in Novell Edirectory 8.8.5
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
The dhost web service in Novell eDirectory 8.8.5 uses a predictable session cookie, which makes it easier for remote attackers to hijack sessions via a modified cookie.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Exploit-Db
description | Novell eDirectory 8.8.5 DHost Weak Session Cookie Session Hijacking Vulnerability. CVE-2009-4655. Remote exploit for novell platform |
id | EDB-ID:33767 |
last seen | 2016-02-03 |
modified | 2010-03-14 |
published | 2010-03-14 |
reporter | metasploit |
source | https://www.exploit-db.com/download/33767/ |
title | Novell eDirectory 8.8.5 DHost Weak Session Cookie Session Hijacking Vulnerability |
Metasploit
description | This module is able to predict the next session cookie value issued by the DHOST web service of Novell eDirectory 8.8.5. An attacker can run this module, wait until the real administrator logs in, then specify the predicted cookie value to hijack their session. |
id | MSF:AUXILIARY/ADMIN/EDIRECTORY/EDIRECTORY_DHOST_COOKIE |
last seen | 2020-06-07 |
modified | 2018-07-09 |
published | 2009-11-13 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4655 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb |
title | Novell eDirectory DHOST Predictable Session Cookie |
Nessus
NASL family | Web Servers |
NASL id | EDIR_DHOST_PREDICTABLE_IDS.NASL |
description | The eDirectory DHost web server running on the remote host generates predictable session IDs. A remote attacker could exploit this by predicting the session ID of a legitimately logged-in user, which could lead to the hijacking of administrative sessions. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 45109 |
published | 2010-03-19 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/45109 |
title | Novell eDirectory DHost Predictable Session ID |
code |
|