First published: Fri Aug 10 2018(Updated: )
Unauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 before version 0.1.24 allows attackers on the same subnet to gain temporary AWS credentials for the users' roles.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Cloudtoken | >=0.1.1<0.1.24 | |
pip/cloudtoken | >=0.1.1<0.1.24 | 0.1.24 |
>=0.1.1<0.1.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13390 is classified as a high severity vulnerability due to the potential for unauthorized access to AWS credentials.
To fix CVE-2018-13390, upgrade the Cloudtoken package to version 0.1.24 or later.
CVE-2018-13390 affects users running Cloudtoken versions from 0.1.1 before 0.1.24 on Linux.
The risks of CVE-2018-13390 include potential unauthorized access to temporary AWS credentials, which could lead to data breaches.
Yes, CVE-2018-13390 can be exploited remotely by attackers on the same subnet as the vulnerable Cloudtoken daemon.