CVE-2018-1127

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.
References
Configurations

Configuration 1

cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*

Information

Published : 2018-09-11 03:29

Updated : 2019-10-09 11:38


NVD link : CVE-2018-1127

Mitre link : CVE-2018-1127

Products Affected
No products.
CWE
CWE-384

Session Fixation