CVE-2009-3585

Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages a second web server within the same domain.
References
Link Resource
http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html Patch
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html Patch
http://secunia.com/advisories/37546 Vendor Advisory
http://secunia.com/advisories/37728 Vendor Advisory
http://www.securityfocus.com/bid/37162
https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html Patch
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html Patch
http://secunia.com/advisories/37546 Vendor Advisory
http://secunia.com/advisories/37728 Vendor Advisory
http://www.securityfocus.com/bid/37162
https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bestpractical:rt:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.11:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.0.12:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.5:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.4.6:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.5:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.6:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.7:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.8:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.6.9:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*

History

No history.

Information

Published : 2009-12-02 16:30

Updated : 2025-04-09 00:30


NVD link : CVE-2009-3585

Mitre link : CVE-2009-3585

CVE.ORG link : CVE-2009-3585


JSON object : View

Products Affected

bestpractical

  • rt
CWE
CWE-287

Improper Authentication