Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jwq3-h8rx-wcwj

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

EPSS

Процентиль: 63%
0.00456
Низкий

8.1 High

CVSS3

Дефекты

CWE-384

Связанные уязвимости

CVSS3: 4.2
redhat
почти 8 лет назад

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

CVSS3: 4.2
nvd
больше 7 лет назад

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

EPSS

Процентиль: 63%
0.00456
Низкий

8.1 High

CVSS3

Дефекты

CWE-384