Lucene search

K
openvasCopyright (C) 2010 Greenbone AGOPENVAS:1361412562310800731
HistoryMar 10, 2010 - 12:00 a.m.

Novell eDirectory 'DHOST' Cookie Hijack Vulnerability

2010-03-1000:00:00
Copyright (C) 2010 Greenbone AG
plugins.openvas.org
11

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.7 Medium

AI Score

Confidence

Low

0.067 Low

EPSS

Percentile

93.9%

Novell eDirectory is prone to a session cookie hijack vulnerability.

# SPDX-FileCopyrightText: 2010 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.800731");
  script_version("2024-03-04T14:37:58+0000");
  script_tag(name:"last_modification", value:"2024-03-04 14:37:58 +0000 (Mon, 04 Mar 2024)");
  script_tag(name:"creation_date", value:"2010-03-10 15:48:25 +0100 (Wed, 10 Mar 2010)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-2009-4655");
  script_name("Novell eDirectory 'DHOST' Cookie Hijack Vulnerability");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2010 Greenbone AG");
  script_family("General");
  script_dependencies("novell_edirectory_detect.nasl");
  script_mandatory_keys("eDirectory/installed");

  script_xref(name:"URL", value:"http://www.metasploit.com/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie");

  script_tag(name:"insight", value:"The flaw is due to error in an 'DHOST' module when handling DHOST web
  services. An attacker would wait until the real administrator logs in, then
  specify the predicted cookie value to hijack their session.");

  script_tag(name:"solution", value:"Apply the vendor provided patch.");

  script_tag(name:"summary", value:"Novell eDirectory is prone to a session cookie hijack vulnerability.");

  script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to hijack arbitrary
  sessions.");

  script_tag(name:"affected", value:"Novell eDirectory version 8.8.5 and prior.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_banner");

  script_xref(name:"URL", value:"http://www.novell.com/support/kb/doc.php?id=3426981");
  exit(0);
}

include("version_func.inc");
include("host_details.inc");

cpe_list = make_list( "cpe:/a:novell:edirectory", "cpe:/a:netiq:edirectory" );

if( ! infos = get_app_port_from_list( cpe_list:cpe_list ) )
  exit( 0 );

cpe  = infos["cpe"];
port = infos["port"];

if( ! major = get_app_version( cpe:cpe, port:port ) )
  exit( 0 );

if( ! sp = get_kb_item( "ldap/eDirectory/" + port + "/sp" ) )
  sp = "0";

reportver = major;

if( sp > 0 )
  reportver += ' SP' + sp;

edirVer = major + '.' + sp;

if(version_in_range(version:edirVer, test_version:"8.8", test_version2:"8.8.5")){
  report = report_fixed_ver( installed_version:reportver, fixed_version:"See advisory" );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.7 Medium

AI Score

Confidence

Low

0.067 Low

EPSS

Percentile

93.9%

Related for OPENVAS:1361412562310800731