{ "id": "CVE-2009-2165", "sourceIdentifier": "cve@mitre.org", "published": "2009-06-22T20:30:00.267", "lastModified": "2009-06-26T04:00:00.000", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SerendipityNZ (aka SimpleBoxes) Serene Bach 2.20R and earlier, and 3.00 beta023 and earlier 3.x versions, uses a predictable session id, which makes it easier for remote attackers to hijack sessions via a modified id." }, { "lang": "es", "value": "Serena Bach de SerendipityNZ (SimpleBoxes) v2.20R y anteriores, 3.00 beta023 y versiones anteriores a la v3.x usa un identificador de sesi\u00f3n predecible, lo que facilita a atacantes remotos secuestrar la sesi\u00f3n a trav\u00e9s de un id modificado." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:serendipitynz:serene_bach:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.20r", "matchCriteriaId": "75F8771D-4334-4333-8160-5355B067EFCD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:serendipitynz:serene_bach:1.18r:*:*:*:*:*:*:*", "matchCriteriaId": "A7962E28-D16E-488F-AA38-A3D0193D0493" }, { "vulnerable": true, "criteria": "cpe:2.3:a:serendipitynz:serene_bach:1.19r:*:*:*:*:*:*:*", "matchCriteriaId": "A489E8CC-5B8B-49E7-AAC0-DDFA202BCE8A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:serendipitynz:serene_bach:2.05r:*:*:*:*:*:*:*", "matchCriteriaId": "79A67B19-F6CB-4451-A1E2-D8E95E752181" }, { "vulnerable": true, "criteria": "cpe:2.3:a:serendipitynz:serene_bach:2.08d:*:*:*:*:*:*:*", "matchCriteriaId": "B136BFFA-B2A6-4658-8778-AA74686BF652" }, { "vulnerable": true, "criteria": "cpe:2.3:a:serendipitynz:serene_bach:2.09r:*:*:*:*:*:*:*", "matchCriteriaId": "0D4AE0BC-73FD-4EF6-9963-1D7AFCFEAE7C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:serendipitynz:serene_bach:3.00:beta023:*:*:*:*:*:*", "matchCriteriaId": "F9C94ECC-875D-41DF-876E-D67A0DA6CC25" } ] } ] } ], "references": [ { "url": "http://jvn.jp/en/jp/JVN20689557/index.html", "source": "cve@mitre.org" }, { "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000035.html", "source": "cve@mitre.org" }, { "url": "http://serenebach.net/log/sb221R.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/35254", "source": "cve@mitre.org" } ] }