Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:2616 | vendor advisory |
http://www.securitytracker.com/id/1041597 | vdb entry third party advisory |
https://github.com/Tendrl/api/pull/422 | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1127 | issue tracking patch vendor advisory |