cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter.
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.
Link | Tags |
---|---|
http://trac.metasploit.com/browser/framework3/trunk/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb?rev=6733 | broken link exploit |
http://osvdb.org/55586 | broken link vdb entry exploit |
http://secunia.com/advisories/35666 | vendor advisory broken link third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51539 | third party advisory vdb entry |