CVE-2009-2631

Clientless SSL VPN products break web browser domain-based security models

Description

Multiple clientless SSL VPN products that run in web browsers, including Stonesoft StoneGate; Cisco ASA; SonicWALL E-Class SSL VPN and SonicWALL SSL VPN; SafeNet SecureWire Access Gateway; Juniper Networks Secure Access; Nortel CallPilot; Citrix Access Gateway; and other products, when running in configurations that do not restrict access to the same domain as the VPN, retrieve the content of remote URLs from one domain and rewrite them so they originate from the VPN's domain, which violates the same origin policy and allows remote attackers to conduct cross-site scripting attacks, read cookies that originated from other domains, access the Web VPN session to gain access to internal resources, perform key logging, and conduct other attacks. NOTE: it could be argued that this is a fundamental design problem in any clientless VPN solution, as opposed to a commonly-introduced error that can be fixed in separate implementations. Therefore a single CVE has been assigned for all products that have this design

Categories

6.8
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 1.01% Top 25%
Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory sonicwall.com Vendor Advisory sonicwall.com Vendor Advisory stonesoft.com Vendor Advisory vupen.com Vendor Advisory vupen.com Vendor Advisory vupen.com Vendor Advisory vupen.com Vendor Advisory vupen.com
Affected: Cisco Adaptive Security Appliance Web SSL VPN
Affected: Palo Alto PAN OS Web SSL VPN
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2009-2631?
CVE-2009-2631 has been scored as a medium severity vulnerability.
How to fix CVE-2009-2631?
To fix CVE-2009-2631, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2009-2631 being actively exploited in the wild?
It is possible that CVE-2009-2631 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2009-2631?
CVE-2009-2631 affects Cisco Adaptive Security Appliance Web SSL VPN, Palo Alto PAN OS Web SSL VPN.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.