cve/2015/CVE-2015-2804.md

20 lines
982 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-2804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2804)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, and 6855 with firmware before 6.6.4.309.R01 and 6.6.5.x before 6.6.5.80.R02 generates weak session identifiers, which allows remote attackers to hijack arbitrary sessions via a brute force attack.
### POC
#### Reference
- http://packetstormsecurity.com/files/132235/Alcatel-Lucent-OmniSwitch-Web-Interface-Weak-Session-ID.html
- http://seclists.org/fulldisclosure/2015/Jun/22
- https://www.redteam-pentesting.de/en/advisories/rt-sa-2015-003/-alcatel-lucent-omniswitch-web-interface-weak-session-id
#### Github
No PoCs found on GitHub currently.