Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.
References
Link Resource
http://www.securitytracker.com/id/1041597 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:2616 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1127 Issue Tracking Patch Vendor Advisory
https://github.com/Tendrl/api/pull/422 Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2018-09-11T15:00:00

Updated: 2018-09-12T09:57:01

Reserved: 2017-12-04T00:00:00


Link: CVE-2018-1127

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-09-11T15:29:00.593

Modified: 2019-10-09T23:38:10.177


Link: CVE-2018-1127

JSON object: View

cve-icon Redhat Information

No data.