Insufficient Session Expiration Affecting github.com/gravitational/teleport/lib/authz package, versions <13.4.26>=14.0.0 <14.3.20>=15.0.0 <15.3.6


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Expiration vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMGRAVITATIONALTELEPORTLIBAUTHZ-7086068
  • published24 May 2024
  • disclosed24 May 2024
  • creditUnknown

Introduced: 24 May 2024

CVE NOT AVAILABLE CWE-613  (opens in a new tab)

How to fix?

Upgrade github.com/gravitational/teleport/lib/authz to version 13.4.26, 14.3.20, 15.3.6 or higher.

Overview

Affected versions of this package are vulnerable to Insufficient Session Expiration due to not terminating some long-running mTLS-authenticated connections past the expiry of client certificates for users with the disconnect_expired_cert option. This could allow such users to perform some API actions after their certificate has expired.

CVSS Scores

version 3.1