In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”
Name | Vendor | Start Version | End Version |
---|---|---|---|
Salt | Saltstack | * | 2015.8.10 (excluding) |
Salt | Saltstack | 2015.8.11 (including) | 2015.8.13 (excluding) |
Salt | Saltstack | 2016.3.0 (including) | 2016.3.4 (excluding) |
Salt | Saltstack | 2016.3.5 (including) | 2016.3.6 (excluding) |
Salt | Saltstack | 2016.3.7 (including) | 2016.3.8 (excluding) |
Salt | Saltstack | 2016.3.9 (including) | 2016.11.3 (excluding) |
Salt | Saltstack | 2016.11.4 (including) | 2016.11.5 (excluding) |
Salt | Saltstack | 2016.11.7 (including) | 2016.11.10 (excluding) |
Salt | Saltstack | 2017.5.0 (including) | 2017.7.8 (excluding) |
Salt | Saltstack | 2018.2.0 (including) | 2018.3.5 (including) |
Salt | Saltstack | 2019.2.0 (including) | 2019.2.5 (excluding) |
Salt | Saltstack | 2019.2.6 (including) | 2019.2.8 (excluding) |
Salt | Saltstack | 3000 (including) | 3000.6 (excluding) |
Salt | Saltstack | 3001 (including) | 3001.4 (excluding) |
Salt | Saltstack | 3002 (including) | 3002.5 (excluding) |
Salt | Ubuntu | bionic | * |
Salt | Ubuntu | groovy | * |
Salt | Ubuntu | hirsute | * |
Salt | Ubuntu | impish | * |
Salt | Ubuntu | kinetic | * |
Salt | Ubuntu | trusty | * |
Salt | Ubuntu | xenial | * |