Vulnerability Details : CVE-2019-3790
The Pivotal Ops Manager, 2.2.x versions prior to 2.2.23, 2.3.x versions prior to 2.3.16, 2.4.x versions prior to 2.4.11, and 2.5.x versions prior to 2.5.3, contain configuration that circumvents refresh token expiration. A remote authenticated user can gain access to a browser session that was supposed to have expired, and access Ops Manager resources.
Products affected by CVE-2019-3790
- cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-3790
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 16 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-3790
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:N |
8.0
|
4.9
|
NIST | |
5.4
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
2.8
|
2.5
|
NIST | |
6.1
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N |
0.9
|
5.2
|
Dell |
CWE ids for CVE-2019-3790
-
The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.Assigned by: security_alert@emc.com (Secondary)
-
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-3790
-
http://www.securityfocus.com/bid/108512
Pivotal Ops Manager CVE-2019-3790 Unauthorized Access VulnerabilityThird Party Advisory;VDB Entry
-
https://pivotal.io/security/cve-2019-3790
CVE-2019-3790: Ops Manager uaa client issues tokens after refresh token expiration | Security | PivotalVendor Advisory
Jump to