ID CVE-2009-4655
Summary The dhost web service in Novell eDirectory 8.8.5 uses a predictable session cookie, which makes it easier for remote attackers to hijack sessions via a modified cookie.
References
Vulnerable Configurations
  • cpe:2.3:a:novell:edirectory:8.8.5
    cpe:2.3:a:novell:edirectory:8.8.5
CVSS
Base: 7.5 (as of 01-03-2010 - 12:05)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
description Novell eDirectory 8.8.5 DHost Weak Session Cookie Session Hijacking Vulnerability. CVE-2009-4655. Remote exploit for novell platform
id EDB-ID:33767
last seen 2016-02-03
modified 2010-03-14
published 2010-03-14
reporter metasploit
source https://www.exploit-db.com/download/33767/
title Novell eDirectory 8.8.5 DHost Weak Session Cookie Session Hijacking Vulnerability
metasploit via4
description This module is able to predict the next session cookie value issued by the DHOST web service of Novell eDirectory 8.8.5. An attacker can run this module, wait until the real administrator logs in, then specify the predicted cookie value to hijack their session.
id MSF:AUXILIARY/ADMIN/EDIRECTORY/EDIRECTORY_DHOST_COOKIE
last seen 2019-03-11
modified 2018-07-09
published 2009-11-13
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb
title Novell eDirectory DHOST Predictable Session Cookie
nessus via4
NASL family Web Servers
NASL id EDIR_DHOST_PREDICTABLE_IDS.NASL
description The eDirectory DHost web server running on the remote host generates predictable session IDs. A remote attacker could exploit this by predicting the session ID of a legitimately logged-in user, which could lead to the hijacking of administrative sessions.
last seen 2019-02-21
modified 2018-07-10
plugin id 45109
published 2010-03-19
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=45109
title Novell eDirectory DHost Predictable Session ID
refmap via4
misc
osvdb 60035
xf edirectory-dhost-session-hijacking(56613)
Last major update 28-04-2010 - 01:44
Published 26-02-2010 - 13:30
Last modified 16-08-2017 - 21:31
Back to Top