CVE Vulnerabilities

CVE-2023-49935

Insufficient Session Expiration

Published: Dec 14, 2023 | Modified: Jan 03, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Slurm Schedmd 23.02 (including) 23.02.7 (excluding)
Slurm Schedmd 23.11 (including) 23.11 (including)
Slurm Schedmd 23.11-rc1 (including) 23.11-rc1 (including)

Potential Mitigations

References