CVE-2009-0662
 
Severity Score
6.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The PlonePAS product 3.x before 3.9 and 3.2.x before 3.2.2, a product for Plone, does not properly handle the login form, which allows remote authenticated users to acquire the identity of an arbitrary user via unspecified vectors.
El producto PlonePAS 3.x anterior a la version 3.9 y 3.2.x en versiones anteriores a la 3.2.2, un producto para Plone, no maneja adecuadamente el formulario de login, lo que permite a atacantes remotos autenticados adquirir la identidad de un usuario de su elección a través de vectores no especificados.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2009-02-22 CVE Reserved
- 2009-04-23 CVE Published
- 2023-06-11 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://osvdb.org/53975 | Vdb Entry | |
http://www.securityfocus.com/bid/34664 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50061 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://plone.org/products/plone/security/advisories/cve-2009-0662 | 2017-08-17 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/34840 | 2017-08-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Plone Search vendor "Plone" | Plonepas Search vendor "Plone" for product "Plonepas" | 3.0 Search vendor "Plone" for product "Plonepas" and version "3.0" | - |
Affected
| in | Plone Search vendor "Plone" | Plone Search vendor "Plone" for product "Plone" | * | - |
Safe
|
Plone Search vendor "Plone" | Plonepas Search vendor "Plone" for product "Plonepas" | 3.1 Search vendor "Plone" for product "Plonepas" and version "3.1" | - |
Affected
| in | Plone Search vendor "Plone" | Plone Search vendor "Plone" for product "Plone" | * | - |
Safe
|
Plone Search vendor "Plone" | Plonepas Search vendor "Plone" for product "Plonepas" | 3.2 Search vendor "Plone" for product "Plonepas" and version "3.2" | - |
Affected
| in | Plone Search vendor "Plone" | Plone Search vendor "Plone" for product "Plone" | * | - |
Safe
|
Plone Search vendor "Plone" | Plonepas Search vendor "Plone" for product "Plonepas" | 3.3 Search vendor "Plone" for product "Plonepas" and version "3.3" | - |
Affected
| in | Plone Search vendor "Plone" | Plone Search vendor "Plone" for product "Plone" | * | - |
Safe
|
Plone Search vendor "Plone" | Plonepas Search vendor "Plone" for product "Plonepas" | 3.4 Search vendor "Plone" for product "Plonepas" and version "3.4" | - |
Affected
| in | Plone Search vendor "Plone" | Plone Search vendor "Plone" for product "Plone" | * | - |
Safe
|
Plone Search vendor "Plone" | Plonepas Search vendor "Plone" for product "Plonepas" | 3.5 Search vendor "Plone" for product "Plonepas" and version "3.5" | - |
Affected
| in | Plone Search vendor "Plone" | Plone Search vendor "Plone" for product "Plone" | * | - |
Safe
|