CVE-2009-2631

Description

Multiple clientless SSL VPN products that run in web browsers, including Stonesoft StoneGate; Cisco ASA; SonicWALL E-Class SSL VPN and SonicWALL SSL VPN; SafeNet SecureWire Access Gateway; Juniper Networks Secure Access; Nortel CallPilot; Citrix Access Gateway; and other products, when running in configurations that do not restrict access to the same domain as the VPN, retrieve the content of remote URLs from one domain and rewrite them so they originate from the VPN's domain, which violates the same origin policy and allows remote attackers to conduct cross-site scripting attacks, read cookies that originated from other domains, access the Web VPN session to gain access to internal resources, perform key logging, and conduct other attacks. NOTE: it could be argued that this is a fundamental design problem in any clientless VPN solution, as opposed to a commonly-introduced error that can be fixed in separate implementations. Therefore a single CVE has been assigned for all products that have this design.

Category

6.8
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 1.01% Top 25%
Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory sonicwall.com Vendor Advisory sonicwall.com Vendor Advisory stonesoft.com Vendor Advisory vupen.com Vendor Advisory vupen.com Vendor Advisory vupen.com Vendor Advisory vupen.com Vendor Advisory vupen.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://secunia.com/advisories/37786 third party advisory vendor advisory
http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/50/025367-01.pdf
http://www.securityfocus.com/archive/1/508164/100/0/threaded mailing list
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=984744
http://www.kb.cert.org/vuls/id/261869 third party advisory us government resource
http://www.securityfocus.com/bid/37152 vdb entry
http://www.stonesoft.com/en/support/security_advisories/2009_03_12.html vendor advisory
http://www.vupen.com/english/advisories/2009/3569 vdb entry vendor advisory
http://seclists.org/fulldisclosure/2006/Jun/238 mailing list
http://securitytracker.com/id?1023255 vdb entry
http://www.vupen.com/english/advisories/2009/3571 vdb entry vendor advisory
http://seclists.org/fulldisclosure/2006/Jun/269 mailing list
http://secunia.com/advisories/37788 third party advisory vendor advisory
http://secunia.com/advisories/37696 third party advisory vendor advisory
http://www.sonicwall.com/us/2123_14882.html vendor advisory
http://www.sonicwall.com/us/2123_14883.html vendor advisory
http://www.vupen.com/english/advisories/2009/3570 vdb entry vendor advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54523 vdb entry
http://kb.juniper.net/KB15799
http://seclists.org/fulldisclosure/2006/Jun/270 mailing list
http://www.vupen.com/english/advisories/2009/3568 vdb entry vendor advisory
http://www.vupen.com/english/advisories/2009/3567 vdb entry vendor advisory
http://secunia.com/advisories/37789 third party advisory vendor advisory

Frequently Asked Questions

What is the severity of CVE-2009-2631?
CVE-2009-2631 has been scored as a medium severity vulnerability.
How to fix CVE-2009-2631?
To fix CVE-2009-2631, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2009-2631 being actively exploited in the wild?
It is possible that CVE-2009-2631 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.