First published: Fri Sep 13 2024(Updated: )
IBM Aspera Shares 1.0 through 1.10.0 PL3 does not invalidate session after a password reset which could allow an authenticated user to impersonate another user on the system.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Aspera Shares | <=1.0.0 - 1.10.0 PL2 | |
IBM Aspera Shares | >=1.0.0<1.10.0 | |
IBM Aspera Shares | =1.10.0 | |
IBM Aspera Shares | =1.10.0-patch_level1 | |
IBM Aspera Shares | =1.10.0-patch_level2 | |
IBM Aspera Shares | =1.10.0-patch_level3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38315 has been classified as a medium severity vulnerability due to the risk of user impersonation.
To fix CVE-2024-38315, ensure that you upgrade to a patched version of IBM Aspera Shares that addresses the session invalidation issue.
IBM Aspera Shares versions from 1.0.0 to 1.10.0 PL3 are affected by CVE-2024-38315.
CVE-2024-38315 exploits the failure to invalidate user sessions after a password reset, allowing impersonation of other users.
As of now, there are no official workarounds for CVE-2024-38315 other than upgrading to a secure version.