CVE Vulnerabilities

CVE-2021-3144

Insufficient Session Expiration

Published: Feb 27, 2021 | Modified: Dec 21, 2023
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.4 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM

In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Salt Saltstack * 2015.8.10 (excluding)
Salt Saltstack 2015.8.11 (including) 2015.8.13 (excluding)
Salt Saltstack 2016.3.0 (including) 2016.3.4 (excluding)
Salt Saltstack 2016.3.5 (including) 2016.3.6 (excluding)
Salt Saltstack 2016.3.7 (including) 2016.3.8 (excluding)
Salt Saltstack 2016.3.9 (including) 2016.11.3 (excluding)
Salt Saltstack 2016.11.4 (including) 2016.11.5 (excluding)
Salt Saltstack 2016.11.7 (including) 2016.11.10 (excluding)
Salt Saltstack 2017.5.0 (including) 2017.7.8 (excluding)
Salt Saltstack 2018.2.0 (including) 2018.3.5 (including)
Salt Saltstack 2019.2.0 (including) 2019.2.5 (excluding)
Salt Saltstack 2019.2.6 (including) 2019.2.8 (excluding)
Salt Saltstack 3000 (including) 3000.6 (excluding)
Salt Saltstack 3001 (including) 3001.4 (excluding)
Salt Saltstack 3002 (including) 3002.5 (excluding)
Salt Ubuntu bionic *
Salt Ubuntu groovy *
Salt Ubuntu hirsute *
Salt Ubuntu impish *
Salt Ubuntu kinetic *
Salt Ubuntu trusty *
Salt Ubuntu xenial *

Potential Mitigations

References