Description
Unauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 before version 0.1.24 allows attackers on the same subnet to gain temporary AWS credentials for the users' roles.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0028 | Unauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 before version 0.1.24 allows attackers on the same subnet to gain temporary AWS credentials for the users' roles. |
Github GHSA |
GHSA-4fpg-j5mp-783g | Cloudtoken Insufficiently Protects Credentials |
References
History
No history.
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2024-09-17T03:38:25.019Z
Reserved: 2018-07-06T00:00:00.000Z
Link: CVE-2018-13390
No data.
Status : Modified
Published: 2018-08-10T15:29:00.377
Modified: 2024-11-21T03:47:00.663
Link: CVE-2018-13390
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA