ID CVE-2010-0217
Summary Zeacom Chat Server before 5.1 uses too short a random string for the JSESSIONID value, which makes it easier for remote attackers to hijack sessions or cause a denial of service (Chat Server crash or Tomcat daemon crash) via a brute-force attack.
References
Vulnerable Configurations
  • cpe:2.3:a:zeacom:chat_server:*:sp4:*:*:*:*:*:*
    cpe:2.3:a:zeacom:chat_server:*:sp4:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 10-10-2018 - 19:51)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:P
refmap via4
bid 47910
bugtraq 20110517 CVE-2010-0217 - Zeacom Chat Server JSESSIONID weak SessionID Vulnerability
misc http://www.packetninjas.net/storage/advisories/Zeacom-CVE-2010-0217.txt
sreason 8255
xf chat-server-jsessionid-session-hijacking(67540)
Last major update 10-10-2018 - 19:51
Published 20-05-2011 - 22:55
Last modified 10-10-2018 - 19:51
Back to Top