CVE-2023-41041
CVSS 3.1 Score 3.1 of 10 (low)
Details
Summary
CVE-2023-41041: In a Graylog multi-node cluster, after a user logs out, their session may still be used for API requests on other nodes until its expiry time is reached. Each node maintains a cache of user sessions, which is updated when a cache-miss occurs. Upon removal of the session from the local cache and database on the node where the user logged out, other nodes continue using the cached session. This vulnerability allows unauthorized access to Graylog APIs for the duration of the session lifetime, starting from the time of user logout. Users are advised to upgrade to versions 5.0.9 or 5.1.3 to mitigate this issue. No session identifiers are leaked during this vulnerability.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Products
- Graylog
Affected Vendors
- Graylog