ID

VAR-200907-0376


CVE

CVE-2009-2344


TITLE

Sourcefire DC and 3D Sensor of Web Vulnerabilities that gain privileges in the base management interface

Trust: 0.8

sources: JVNDB: JVNDB-2009-006132

DESCRIPTION

The web-based management interfaces in Sourcefire Defense Center (DC) and 3D Sensor before 4.8.2 allow remote authenticated users to gain privileges via a $admin value for the admin parameter in an edit action to admin/user/user.cgi and unspecified other components. Sourcefire 3D Sensor and Defense Center are prone to multiple security-bypass vulnerabilities. An attacker may exploit these issues to gain administrative access to the vulnerable device, which may aid in further attacks. Versions prior to the following are vulnerable: Sourcefire 3D Sensor 4.8.2 Sourcefire Defense Center 4.8.2. Although the user.cgi PERL script correctly verifies that the incoming request belongs to an authenticated session, in this case it is blindly granted read and write access without regard to the role of the originator of the request, so even users with the lowest access levels (such as Users who have not configured any roles) can also promote them to administrators and change other roles or account parameters at will. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Sourcefire 3D Sensor and Defense Center "user.cgi" Security Bypass SECUNIA ADVISORY ID: SA35658 VERIFY ADVISORY: http://secunia.com/advisories/35658/ DESCRIPTION: Gregory Duchemin has reported a vulnerability in Sourcefire 3D Sensor and Sourcefire Defense Center, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to improper access restrictions while processing requests sent to the admin/user/user.cgi script. This can be exploited to e.g. gain administrative access to the appliance by sending a specially crafted POST request to the affected script. NOTE: Other scripts are reportedly affected by similar errors. SOLUTION: Update to firmware version 4.8.2. PROVIDED AND/OR DISCOVERED BY: Gregory Duchemin ORIGINAL ADVISORY: http://milw0rm.com/exploits/9074 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2009-2344 // JVNDB: JVNDB-2009-006132 // BID: 35553 // VULHUB: VHN-39790 // VULMON: CVE-2009-2344 // PACKETSTORM: 78955

AFFECTED PRODUCTS

vendor:sourcefiremodel:defense centerscope:eqversion:4.8.0.4

Trust: 1.6

vendor:sourcefiremodel:defense centerscope:eqversion:4.8.0.3

Trust: 1.6

vendor:sourcefiremodel:3d sensorscope:eqversion:4.8.0.4

Trust: 1.6

vendor:sourcefiremodel:defense centerscope:eqversion:4.8

Trust: 1.6

vendor:sourcefiremodel:3d sensorscope:eqversion:4.8.0.3

Trust: 1.6

vendor:sourcefiremodel:3d sensorscope:eqversion:4.8

Trust: 1.6

vendor:sourcefiremodel:3d sensorscope:lteversion:4.8.1

Trust: 1.0

vendor:sourcefiremodel:defense centerscope:lteversion:4.8.1

Trust: 1.0

vendor:sourcefiremodel:defense centerscope:eqversion:4.8.1

Trust: 0.9

vendor:sourcefiremodel:3d sensorscope:eqversion:4.8.1

Trust: 0.9

vendor:sourcefiremodel:3d sensorscope:ltversion:4.8.2

Trust: 0.8

vendor:sourcefiremodel:defense centerscope: - version: -

Trust: 0.8

vendor:sourcefiremodel:defense centerscope:neversion:4.8.2

Trust: 0.3

vendor:sourcefiremodel:3d sensorscope:neversion:4.8.2

Trust: 0.3

sources: BID: 35553 // JVNDB: JVNDB-2009-006132 // CNNVD: CNNVD-200907-096 // NVD: CVE-2009-2344

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2344
value: HIGH

Trust: 1.0

NVD: CVE-2009-2344
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200907-096
value: CRITICAL

Trust: 0.6

VULHUB: VHN-39790
value: HIGH

Trust: 0.1

VULMON: CVE-2009-2344
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-2344
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-39790
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-39790 // VULMON: CVE-2009-2344 // JVNDB: JVNDB-2009-006132 // CNNVD: CNNVD-200907-096 // NVD: CVE-2009-2344

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-39790 // JVNDB: JVNDB-2009-006132 // NVD: CVE-2009-2344

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200907-096

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200907-096

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-006132

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-39790 // VULMON: CVE-2009-2344

PATCH

title:Top Pageurl:http://www.sourcefire.com/

Trust: 0.8

sources: JVNDB: JVNDB-2009-006132

EXTERNAL IDS

db:NVDid:CVE-2009-2344

Trust: 2.6

db:BIDid:35553

Trust: 2.1

db:SECUNIAid:35658

Trust: 2.0

db:EXPLOIT-DBid:9074

Trust: 1.9

db:VUPENid:ADV-2009-1785

Trust: 1.8

db:SECTRACKid:1022500

Trust: 1.8

db:JVNDBid:JVNDB-2009-006132

Trust: 0.8

db:BUGTRAQid:20090701 SOURCEFIRE 3D SENSOR AND DC, PRIVILEGE ESCALATION VULNERABILITY

Trust: 0.6

db:MILW0RMid:9074

Trust: 0.6

db:CNNVDid:CNNVD-200907-096

Trust: 0.6

db:SEEBUGid:SSVID-66683

Trust: 0.1

db:VULHUBid:VHN-39790

Trust: 0.1

db:VULMONid:CVE-2009-2344

Trust: 0.1

db:PACKETSTORMid:78955

Trust: 0.1

sources: VULHUB: VHN-39790 // VULMON: CVE-2009-2344 // BID: 35553 // JVNDB: JVNDB-2009-006132 // PACKETSTORM: 78955 // CNNVD: CNNVD-200907-096 // NVD: CVE-2009-2344

REFERENCES

url:http://www.securityfocus.com/bid/35553

Trust: 1.8

url:http://www.securitytracker.com/id?1022500

Trust: 1.8

url:http://secunia.com/advisories/35658

Trust: 1.8

url:http://www.vupen.com/english/advisories/2009/1785

Trust: 1.8

url:http://www.securityfocus.com/archive/1/504694/100/0/threaded

Trust: 1.2

url:http://www.exploit-db.com/exploits/9074

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2344

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2344

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/504694/100/0/threaded

Trust: 0.6

url:http://www.milw0rm.com/exploits/9074

Trust: 0.6

url:http://www.sourcefire.com/products/3d/sensor

Trust: 0.3

url:http://www.sourcefire.com/products/3d/defense_center

Trust: 0.3

url:/archive/1/504694

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/9074/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://milw0rm.com/exploits/9074

Trust: 0.1

url:http://secunia.com/advisories/35658/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-39790 // VULMON: CVE-2009-2344 // BID: 35553 // JVNDB: JVNDB-2009-006132 // PACKETSTORM: 78955 // CNNVD: CNNVD-200907-096 // NVD: CVE-2009-2344

CREDITS

Gregory Duchemin c3rb3r@hotmail.com

Trust: 0.6

sources: CNNVD: CNNVD-200907-096

SOURCES

db:VULHUBid:VHN-39790
db:VULMONid:CVE-2009-2344
db:BIDid:35553
db:JVNDBid:JVNDB-2009-006132
db:PACKETSTORMid:78955
db:CNNVDid:CNNVD-200907-096
db:NVDid:CVE-2009-2344

LAST UPDATE DATE

2025-04-10T23:05:07.840000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39790date:2018-10-10T00:00:00
db:VULMONid:CVE-2009-2344date:2018-10-10T00:00:00
db:BIDid:35553date:2009-07-07T22:06:00
db:JVNDBid:JVNDB-2009-006132date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200907-096date:2009-07-08T00:00:00
db:NVDid:CVE-2009-2344date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-39790date:2009-07-07T00:00:00
db:VULMONid:CVE-2009-2344date:2009-07-07T00:00:00
db:BIDid:35553date:2009-07-02T00:00:00
db:JVNDBid:JVNDB-2009-006132date:2012-12-20T00:00:00
db:PACKETSTORMid:78955date:2009-07-06T14:53:16
db:CNNVDid:CNNVD-200907-096date:2009-07-07T00:00:00
db:NVDid:CVE-2009-2344date:2009-07-07T19:30:00.297