Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2019-5638 | First vendor Publication | 2019-08-21 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Rapid7 Nexpose versions 6.5.50 and prior suffer from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5638 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-613 | Insufficient Session Expiration |
CPE : Common Platform Enumeration
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 13:33:08 |
|
2024-09-17 05:28:01 |
|
2024-05-15 12:59:05 |
|
2023-10-09 21:27:41 |
|
2021-05-04 13:40:55 |
|
2021-04-22 02:52:12 |
|
2020-05-23 02:30:37 |
|
2019-10-10 05:21:08 |
|
2019-08-30 00:19:41 |
|
2019-08-22 05:19:46 |
|