PT-2023-5707 · Graylog · Graylog
Thll
·
Published
2023-07-06
·
Updated
2023-09-05
·
CVE-2023-41041
2.6
Low
Base vector | Vector | AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N |
Name of the Vulnerable Software and Affected Versions:
Graylog versions prior to 5.0.9
Graylog versions prior to 5.1.3
Description:
The issue is related to the incorrect session expiration in a multi-node Graylog cluster. After a user has explicitly logged out, a user session may still be used for API requests until it has reached its original expiry time. Each node maintains an in-memory cache of user sessions, and when the user logs out, the session is removed from the node-local cache and deleted from the database. However, other nodes will still use the cached session until they attempt to update the session in the database. If the session update is prevented by setting the `X-Graylog-No-Session-Extension:true` header in the request, the node will consider the cached session valid until the session is expired according to its timeout setting. No session identifiers are leaked, but if the session becomes compromised later, it can still be used to perform API requests against the Graylog cluster.
Recommendations:
For Graylog versions prior to 5.0.9, upgrade to version 5.0.9 or later.
For Graylog versions prior to 5.1.3, upgrade to version 5.1.3 or later.
As a temporary workaround, consider setting the `X-Graylog-No-Session-Extension:true` header in API requests to prevent session updates and minimize the risk of exploitation.
Exploit
Fix
Insufficient Session Expiration
Weakness Enumeration
Related Identifiers
Affected Products
References · 10
- 🔥 https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-3fqm-frhg-7c85⭐ 7441 🔗 1067 · Exploit
- https://github.com/Graylog2/graylog2-server/commit/bb88f3d0b2b0351669ab32c60b595ab7242a3fe3⭐ 7445 🔗 1068 · Patch
- https://osv.dev/vulnerability/GHSA-3fqm-frhg-7c85 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2023-41041 · Vendor Advisory
- https://bdu.fstec.ru/vul/2023-06377 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2023-41041 · Security Note
- https://github.com/Graylog2/graylog2-server⭐ 7713 🔗 1086 · Note
- https://github.com/Graylog2/graylog2-server/commit/ff90f3e2aa4ae2e0bb613d3236e52c40aa154b20⭐ 7445 🔗 1068 · Note
- https://vuldb.com/ru/?id.238408 · Note
- https://t.me/cibsecurity/69489 · Telegram Post