Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-1127

Опубликовано: 11 сент. 2018
Источник: nvd
CVSS3: 4.2
CVSS3: 8.1
CVSS2: 6.8
EPSS Низкий

Описание

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*
Версия до 3.4 (исключая)

EPSS

Процентиль: 63%
0.00456
Низкий

4.2 Medium

CVSS3

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-613
CWE-384

Связанные уязвимости

CVSS3: 4.2
redhat
больше 7 лет назад

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

CVSS3: 8.1
github
больше 3 лет назад

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

EPSS

Процентиль: 63%
0.00456
Низкий

4.2 Medium

CVSS3

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-613
CWE-384