Virtual War (aka VWar) 1.6.1 R2 uses static session cookies that depend only on a user's password, which makes it easier for remote attackers to bypass timeout and logout actions, and retain access for a long period of time, by leveraging knowledge of a session cookie.
References
Link | Resource |
---|---|
http://dmcdonald.net/vwar.txt | Exploit |
http://seclists.org/fulldisclosure/2010/Aug/235 | Exploit |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:21:02
Updated: 2022-10-03T16:21:02
Reserved: 2022-10-03T00:00:00
Link: CVE-2010-5067
JSON object: View
NVD Information
Status : Analyzed
Published: 2012-10-08T10:47:44.807
Modified: 2012-10-08T10:47:44.807
Link: CVE-2010-5067
JSON object: View
Redhat Information
No data.
CWE