cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter.
References
Link | Resource |
---|---|
http://osvdb.org/55586 | Broken Link Exploit |
http://secunia.com/advisories/35666 | Broken Link Vendor Advisory |
http://trac.metasploit.com/browser/framework3/trunk/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb?rev=6733 | Broken Link Exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51539 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2009-07-08 15:30
Updated : 2024-02-10 02:59
NVD link : CVE-2009-2367
Mitre link : CVE-2009-2367
CVE.ORG link : CVE-2009-2367
JSON object : View
Products Affected
iomega
- storcenter_pro_firmware
- storcenter_pro
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)