CVE-2018-1127

Severity
8.1HIGH
EPSS
0.4%
top 37.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 11
Latest updateMay 13

Description

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:NExploitability: 1.6 | Impact: 2.5

Affected Packages2 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jwq3-h8rx-wcwj: Tendrl API in Red Hat Gluster Storage before 32022-05-13
CVEList
CVE-2018-1127: Tendrl API in Red Hat Gluster Storage before 32018-09-11

📋Vendor Advisories

1
Red Hat
tendrl-api: Improper cleanup of session token can allow attackers to hijack user sessions2018-05-08

💬Community

2
Bugzilla
CVE-2018-16376 openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c2018-09-06
Bugzilla
CVE-2018-1127 tendrl-api: Improper cleanup of session token can allow attackers to hijack user sessions2018-05-08