First published: Tue Aug 23 2016(Updated: )
Greg Sheremeta of Red Hat reports: We've found a scenario a webadmin session won't timeout and force a logout. We had a CVE on this before. To duplicate: navigate to the Data Centers tab. Select a data center. Switch to another browser tab and wait longer than the engine timeout period [1] to switch back to webadmin. You won't be logged out -- even though you should be. Basically, idling while certain things in the UI are selected (a data center, a cluster -- maybe others?) will prevent the session from timing out. We see three gluster queries that are repeating and keeping the session open. Alexander is looking for others. We know the fix -- just have to find them all.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Virtualization | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6338 has been assigned a severity rating that indicates potential risks due to session management failure.
To fix CVE-2016-6338, update your Red Hat Enterprise Virtualization to the latest security patch provided by Red Hat.
CVE-2016-6338 affects Red Hat Enterprise Virtualization version 4.0.
Yes, CVE-2016-6338 can potentially allow unauthorized access if an admin session does not timeout properly.
Exploitation of CVE-2016-6338 could result in prolonged access to webadmin sessions, posing security risks.