CVE Vulnerabilities

CVE-2021-3144

Insufficient Session Expiration

Published: Feb 27, 2021 | Modified: Nov 21, 2024
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.4 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

NameVendorStart VersionEnd Version
SaltSaltstack*2015.8.10 (excluding)
SaltSaltstack2015.8.11 (including)2015.8.13 (excluding)
SaltSaltstack2016.3.0 (including)2016.3.4 (excluding)
SaltSaltstack2016.3.5 (including)2016.3.6 (excluding)
SaltSaltstack2016.3.7 (including)2016.3.8 (excluding)
SaltSaltstack2016.3.9 (including)2016.11.3 (excluding)
SaltSaltstack2016.11.4 (including)2016.11.5 (excluding)
SaltSaltstack2016.11.7 (including)2016.11.10 (excluding)
SaltSaltstack2017.5.0 (including)2017.7.8 (excluding)
SaltSaltstack2018.2.0 (including)2018.3.5 (including)
SaltSaltstack2019.2.0 (including)2019.2.5 (excluding)
SaltSaltstack2019.2.6 (including)2019.2.8 (excluding)
SaltSaltstack3000 (including)3000.6 (excluding)
SaltSaltstack3001 (including)3001.4 (excluding)
SaltSaltstack3002 (including)3002.5 (excluding)
SaltUbuntubionic*
SaltUbuntugroovy*
SaltUbuntuhirsute*
SaltUbuntuimpish*
SaltUbuntukinetic*
SaltUbuntutrusty*
SaltUbuntutrusty/esm*
SaltUbuntuxenial*

Potential Mitigations

References