CVE-2009-2631

N/A Unknown
Published: December 04, 2009 Modified: April 23, 2026
View on NVD

Description

Multiple clientless SSL VPN products that run in web browsers, including Stonesoft StoneGate; Cisco ASA; SonicWALL E-Class SSL VPN and SonicWALL SSL VPN; SafeNet SecureWire Access Gateway; Juniper Networks Secure Access; Nortel CallPilot; Citrix Access Gateway; and other products, when running in configurations that do not restrict access to the same domain as the VPN, retrieve the content of remote URLs from one domain and rewrite them so they originate from the VPN's domain, which violates the same origin policy and allows remote attackers to conduct cross-site scripting attacks, read cookies that originated from other domains, access the Web VPN session to gain access to internal resources, perform key logging, and conduct other attacks. NOTE: it could be argued that this is a fundamental design problem in any clientless VPN solution, as opposed to a commonly-introduced error that can be fixed in separate implementations. Therefore a single CVE has been assigned for all products that have this design

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://kb.juniper.net/KB15799
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2006/Jun/238
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2006/Jun/269
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2006/Jun/270
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37696
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37786
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37788
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37789
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1023255
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/261869
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.securityfocus.com/archive/1/508164/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/37152
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.sonicwall.com/us/2123_14882.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.sonicwall.com/us/2123_14883.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.stonesoft.com/en/support/security_advisories/2009_03_12.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3567
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3568
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3569
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3570
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3571
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54523
Source: af854a3a-2127-422b-91ae-364da2661108

25 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.8%
75th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

cisco aladdin sonicwall stonesoft