CVE-2009-2631 : Detail

CVE-2009-2631

A01-Broken Access Control
1.01%V4
Network
2009-12-04
10h00 +00:00
2018-10-10
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple clientless SSL VPN products that run in web browsers, including Stonesoft StoneGate; Cisco ASA; SonicWALL E-Class SSL VPN and SonicWALL SSL VPN; SafeNet SecureWire Access Gateway; Juniper Networks Secure Access; Nortel CallPilot; Citrix Access Gateway; and other products, when running in configurations that do not restrict access to the same domain as the VPN, retrieve the content of remote URLs from one domain and rewrite them so they originate from the VPN's domain, which violates the same origin policy and allows remote attackers to conduct cross-site scripting attacks, read cookies that originated from other domains, access the Web VPN session to gain access to internal resources, perform key logging, and conduct other attacks. NOTE: it could be argued that this is a fundamental design problem in any clientless VPN solution, as opposed to a commonly-introduced error that can be fixed in separate implementations. Therefore a single CVE has been assigned for all products that have this design.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-264 Category : Permissions, Privileges, and Access Controls
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Aladdin>>Safenet_securewire_access_gateway >> Version *

    Cisco>>Adaptive_security_appliance >> Version *

    Sonicwall>>E-class_ssl_vpn >> Version *

      Sonicwall>>Ssl_vpn >> Version *

        Stonesoft>>Stonegate >> Version *

          References

          http://secunia.com/advisories/37786
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://www.kb.cert.org/vuls/id/261869
          Tags : third-party-advisory, x_refsource_CERT-VN
          http://www.securityfocus.com/bid/37152
          Tags : vdb-entry, x_refsource_BID
          http://www.vupen.com/english/advisories/2009/3569
          Tags : vdb-entry, x_refsource_VUPEN
          http://seclists.org/fulldisclosure/2006/Jun/238
          Tags : mailing-list, x_refsource_FULLDISC
          http://securitytracker.com/id?1023255
          Tags : vdb-entry, x_refsource_SECTRACK
          http://www.vupen.com/english/advisories/2009/3571
          Tags : vdb-entry, x_refsource_VUPEN
          http://seclists.org/fulldisclosure/2006/Jun/269
          Tags : mailing-list, x_refsource_FULLDISC
          http://secunia.com/advisories/37788
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://secunia.com/advisories/37696
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://www.vupen.com/english/advisories/2009/3570
          Tags : vdb-entry, x_refsource_VUPEN
          http://kb.juniper.net/KB15799
          Tags : x_refsource_CONFIRM
          http://seclists.org/fulldisclosure/2006/Jun/270
          Tags : mailing-list, x_refsource_FULLDISC
          http://www.vupen.com/english/advisories/2009/3568
          Tags : vdb-entry, x_refsource_VUPEN
          http://www.vupen.com/english/advisories/2009/3567
          Tags : vdb-entry, x_refsource_VUPEN
          http://secunia.com/advisories/37789
          Tags : third-party-advisory, x_refsource_SECUNIA