CVE Vulnerabilities

CVE-2009-3585

Improper Authentication

Published: Dec 02, 2009 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V2
4.3 LOW
AV:A/AC:M/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages a second web server within the same domain.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
RtBestpractical3.0.1 (including)3.0.1 (including)
RtBestpractical3.0.2 (including)3.0.2 (including)
RtBestpractical3.0.3 (including)3.0.3 (including)
RtBestpractical3.0.4 (including)3.0.4 (including)
RtBestpractical3.0.5 (including)3.0.5 (including)
RtBestpractical3.0.6 (including)3.0.6 (including)
RtBestpractical3.0.7 (including)3.0.7 (including)
RtBestpractical3.0.7.1 (including)3.0.7.1 (including)
RtBestpractical3.0.8 (including)3.0.8 (including)
RtBestpractical3.0.9 (including)3.0.9 (including)
RtBestpractical3.0.10 (including)3.0.10 (including)
RtBestpractical3.0.11 (including)3.0.11 (including)
RtBestpractical3.0.12 (including)3.0.12 (including)
RtBestpractical3.2.0 (including)3.2.0 (including)
RtBestpractical3.2.1 (including)3.2.1 (including)
RtBestpractical3.2.2 (including)3.2.2 (including)
RtBestpractical3.2.3 (including)3.2.3 (including)
RtBestpractical3.4.0 (including)3.4.0 (including)
RtBestpractical3.4.1 (including)3.4.1 (including)
RtBestpractical3.4.2 (including)3.4.2 (including)
RtBestpractical3.4.3 (including)3.4.3 (including)
RtBestpractical3.4.4 (including)3.4.4 (including)
RtBestpractical3.4.5 (including)3.4.5 (including)
RtBestpractical3.4.6 (including)3.4.6 (including)
RtBestpractical3.6.0 (including)3.6.0 (including)
RtBestpractical3.6.1 (including)3.6.1 (including)
RtBestpractical3.6.2 (including)3.6.2 (including)
RtBestpractical3.6.3 (including)3.6.3 (including)
RtBestpractical3.6.4 (including)3.6.4 (including)
RtBestpractical3.6.5 (including)3.6.5 (including)
RtBestpractical3.6.6 (including)3.6.6 (including)
RtBestpractical3.6.7 (including)3.6.7 (including)
RtBestpractical3.6.8 (including)3.6.8 (including)
RtBestpractical3.6.9 (including)3.6.9 (including)
RtBestpractical3.8.0 (including)3.8.0 (including)
RtBestpractical3.8.1 (including)3.8.1 (including)
RtBestpractical3.8.2 (including)3.8.2 (including)
RtBestpractical3.8.3 (including)3.8.3 (including)
RtBestpractical3.8.4 (including)3.8.4 (including)
RtBestpractical3.8.5 (including)3.8.5 (including)
Request-tracker3.4Ubuntudapper*
Request-tracker3.6Ubuntuhardy*
Request-tracker3.6Ubuntuintrepid*
Request-tracker3.6Ubuntujaunty*
Request-tracker3.6Ubuntukarmic*
Request-tracker3.8Ubuntukarmic*
Request-tracker3.8Ubuntuupstream*

Potential Mitigations

References