Rapid7 InsightVM suffers from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage. This vulnerability is mitigated by the use of the Platform Login feature. This issue is related to CVE-2019-5638.
History

Wed, 19 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2025-02-19T20:27:19.666Z

Reserved: 2021-09-30T17:25:53.996Z

Link: CVE-2021-3844

cve-icon Vulnrichment

Updated: 2024-08-03T17:09:09.527Z

cve-icon NVD

Status : Modified

Published: 2023-03-24T17:15:07.387

Modified: 2024-11-21T06:22:37.213

Link: CVE-2021-3844

cve-icon Redhat

No data.