ID CVE-2009-2367
Summary cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter.
References
Vulnerable Configurations
  • cpe:2.3:h:iomega:storcenter_pro
    cpe:2.3:h:iomega:storcenter_pro
CVSS
Base: 7.5 (as of 08-07-2009 - 12:13)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
metasploit via4
description The Iomega StorCenter Pro Network Attached Storage device web interface increments sessions IDs, allowing for simple brute force attacks to bypass authentication and gain administrative access.
id MSF:AUXILIARY/ADMIN/HTTP/IOMEGA_STORCENTERPRO_SESSIONID
last seen 2019-03-25
modified 2017-11-08
published 2009-07-01
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb
title Iomega StorCenter Pro NAS Web Authentication Bypass
refmap via4
misc http://trac.metasploit.com/browser/framework3/trunk/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb?rev=6733
osvdb 55586
secunia 35666
xf storcenter-session-identifiers-sec-bypass(51539)
Last major update 08-07-2009 - 00:00
Published 08-07-2009 - 11:30
Last modified 16-08-2017 - 21:30
Back to Top