The administrative web console on the TANDBERG Video Communication Server (VCS) before X4.3 uses predictable session cookies in (1) tandberg/web/lib/secure.php and (2) tandberg/web/user/lib/secure.php, which makes it easier for remote attackers to bypass authentication, and execute arbitrary code by loading a custom software update, via a crafted "Cookie: tandberg_login=" HTTP header.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2010-04-13 10:30
Updated : 2018-10-10 12:49
NVD link : CVE-2009-4509
Mitre link : CVE-2009-4509
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
vsecurity
- tandberg_video_communication_server