First published: Wed Mar 04 2009(Updated: )
The Web Editor in Dassault Systemes ENOVIA SmarTeam V5 before Release 18 Service Pack 8, and possibly CATIA and other products, allows remote authenticated users to read the profile card of an object in the document class via a link that is sent from the owner of the document object.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM ENOVIA SmarTeam | <=5.18 | |
CATIA | <=5.18 | |
CATIA | =5.16 | |
CATIA | =5.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0809 is classified as a medium severity vulnerability due to the risk of unauthorized access to sensitive information.
To fix CVE-2009-0809, upgrade to Dassault Systemes ENOVIA SmarTeam V5 Release 18 Service Pack 8 or later, and ensure all user authentication is properly managed.
CVE-2009-0809 affects Dassault Systemes ENOVIA SmarTeam V5 versions prior to 5.18 and IBM CATIA versions 5.16, 5.17, and up to 5.18.
CVE-2009-0809 facilitates information disclosure attacks by allowing remote authenticated users to read object profile cards.
No, while user authentication is required, it is not sufficient alone to prevent CVE-2009-0809 if the software is not updated.