2018-07-06 10:04:23 -04:00
{
2019-03-17 21:57:01 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "security@atlassian.com" ,
"DATE_PUBLIC" : "2018-08-09T00:00:00" ,
"ID" : "CVE-2018-13390" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "cloudtoken" ,
"version" : {
"version_data" : [
{
"version_affected" : ">=" ,
"version_value" : "0.1.1"
} ,
{
"version_affected" : "<" ,
"version_value" : "0.1.24"
}
]
}
}
]
} ,
"vendor_name" : "Atlassian"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2018-08-10 11:39:30 +10:00
{
2019-03-17 21:57:01 +00:00
"lang" : "eng" ,
"value" : "Unauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 before version 0.1.24 allows attackers on the same subnet to gain temporary AWS credentials for the users' roles."
2018-08-10 11:39:30 +10:00
}
2019-03-17 21:57:01 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Improper Restriction of Communication Channel to Intended Endpoints"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://bitbucket.org/atlassian/cloudtoken/wiki/CVE-2018-13390%20-%20Exposed%20credentials%20in%20daemon%20mode%20on%20Linux" ,
"refsource" : "MISC" ,
"url" : "https://bitbucket.org/atlassian/cloudtoken/wiki/CVE-2018-13390%20-%20Exposed%20credentials%20in%20daemon%20mode%20on%20Linux"
}
]
}
}