CVE-2018-1127
Severity
8.1HIGH
EPSS
0.4%
top 37.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 11
Latest updateMay 13
Description
Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:NExploitability: 1.6 | Impact: 2.5
Affected Packages2 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Red Hat▶
tendrl-api: Improper cleanup of session token can allow attackers to hijack user sessions↗2018-05-08