First published: Wed Dec 02 2009(Updated: )
Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages "HTTP access to the RT server," a related issue to CVE-2009-3585.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Best Practical Solutions Request Tracker | =3.0.4 | |
Best Practical Solutions Request Tracker | =3.0.8 | |
Best Practical Solutions Request Tracker | =3.4.5 | |
Best Practical Solutions Request Tracker | =3.0.2 | |
Best Practical Solutions Request Tracker | =3.6.7 | |
Best Practical Solutions Request Tracker | =3.6.2 | |
Best Practical Solutions Request Tracker | =3.2.2 | |
Best Practical Solutions Request Tracker | =3.6.3 | |
Best Practical Solutions Request Tracker | =3.0.11 | |
Best Practical Solutions Request Tracker | =3.8.2 | |
Best Practical Solutions Request Tracker | =3.6.0 | |
Best Practical Solutions Request Tracker | =3.8.0 | |
Best Practical Solutions Request Tracker | =3.4.0 | |
Best Practical Solutions Request Tracker | =3.0.10 | |
Best Practical Solutions Request Tracker | =3.2.3 | |
Best Practical Solutions Request Tracker | =3.0.5 | |
Best Practical Solutions Request Tracker | =3.2.0 | |
Best Practical Solutions Request Tracker | =3.4.6 | |
Best Practical Solutions Request Tracker | =3.0.3 | |
Best Practical Solutions Request Tracker | =3.4.3 | |
Best Practical Solutions Request Tracker | =3.6.9 | |
Best Practical Solutions Request Tracker | =3.6.6 | |
Best Practical Solutions Request Tracker | =3.6.5 | |
Best Practical Solutions Request Tracker | =3.0.1 | |
Best Practical Solutions Request Tracker | =3.2.1 | |
Best Practical Solutions Request Tracker | =3.8.5 | |
Best Practical Solutions Request Tracker | =3.4.4 | |
Best Practical Solutions Request Tracker | =3.6.8 | |
Best Practical Solutions Request Tracker | =3.0.6 | |
Best Practical Solutions Request Tracker | =3.0.7 | |
Best Practical Solutions Request Tracker | =3.0.7.1 | |
Best Practical Solutions Request Tracker | =3.0.12 | |
Best Practical Solutions Request Tracker | =3.0.9 | |
Best Practical Solutions Request Tracker | =3.8.3 | |
Best Practical Solutions Request Tracker | =3.6.1 | |
Best Practical Solutions Request Tracker | =3.4.1 | |
Best Practical Solutions Request Tracker | =3.6.4 | |
Best Practical Solutions Request Tracker | =3.8.1 | |
Best Practical Solutions Request Tracker | =3.8.4 | |
Best Practical Solutions Request Tracker | =3.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4151 has been classified as a high severity vulnerability due to its ability to allow session hijacking.
To fix CVE-2009-4151, it is recommended to apply the patches provided by Best Practical Solutions for affected versions of RT.
CVE-2009-4151 affects Best Practical Solutions RT versions from 3.0.0 up to 3.6.9 and versions 3.8.x up to 3.8.5.
CVE-2009-4151 enables remote attackers to hijack web sessions through session fixation attacks.
While the best solution is applying patches, disabling HTTP access to the RT server may help mitigate CVE-2009-4151 temporarily.