First published: Tue May 08 2018(Updated: )
Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Gluster Storage | <3.4 | |
redhat/rhes | <3.4.0 | 3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-1127.
The severity of CVE-2018-1127 is high (8.1).
This vulnerability affects Red Hat Gluster Storage versions up to (but not including) 3.4.0.
An attacker can exploit this vulnerability by sniffing/MITM attacks to acquire session tokens and authenticate as the target user.
Yes, a fix for CVE-2018-1127 is available in Red Hat Gluster Storage version 3.4.0.