cvelist/2018/13xxx/CVE-2018-13390.json

68 lines
2.4 KiB
JSON
Raw Normal View History

2018-07-06 10:04:23 -04:00
{
2019-03-17 21:57:01 +00:00
"CVE_data_meta": {
"ASSIGNER": "security@atlassian.com",
"DATE_PUBLIC": "2018-08-09T00:00:00",
"ID": "CVE-2018-13390",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "cloudtoken",
"version": {
"version_data": [
{
"version_affected": ">=",
"version_value": "0.1.1"
},
{
"version_affected": "<",
"version_value": "0.1.24"
}
]
}
}
]
},
"vendor_name": "Atlassian"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-08-10 11:39:30 +10:00
{
2019-03-17 21:57:01 +00:00
"lang": "eng",
"value": "Unauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 before version 0.1.24 allows attackers on the same subnet to gain temporary AWS credentials for the users' roles."
2018-08-10 11:39:30 +10:00
}
2019-03-17 21:57:01 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Communication Channel to Intended Endpoints"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bitbucket.org/atlassian/cloudtoken/wiki/CVE-2018-13390%20-%20Exposed%20credentials%20in%20daemon%20mode%20on%20Linux",
"refsource": "MISC",
"url": "https://bitbucket.org/atlassian/cloudtoken/wiki/CVE-2018-13390%20-%20Exposed%20credentials%20in%20daemon%20mode%20on%20Linux"
}
]
}
}