Unauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 before version 0.1.24 allows attackers on the same subnet to gain temporary AWS credentials for the users' roles.
References
Link | Resource |
---|---|
https://bitbucket.org/atlassian/cloudtoken/wiki/CVE-2018-13390%20-%20Exposed%20credentials%20in%20daemon%20mode%20on%20Linux | Mitigation Third Party Advisory |
https://bitbucket.org/atlassian/cloudtoken/wiki/CVE-2018-13390%20-%20Exposed%20credentials%20in%20daemon%20mode%20on%20Linux | Mitigation Third Party Advisory |
Configurations
History
21 Nov 2024, 03:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://bitbucket.org/atlassian/cloudtoken/wiki/CVE-2018-13390%20-%20Exposed%20credentials%20in%20daemon%20mode%20on%20Linux - Mitigation, Third Party Advisory |
Information
Published : 2018-08-10 15:29
Updated : 2024-11-21 03:47
NVD link : CVE-2018-13390
Mitre link : CVE-2018-13390
CVE.ORG link : CVE-2018-13390
JSON object : View
Products Affected
atlassian
- cloudtoken
CWE