The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Insufficient Session Expiration vulnerabilities in an interactive lesson.
Start learningUpgrade org.graylog2:graylog2-server
to version 5.0.9, 5.1.3 or higher.
org.graylog2:graylog2-server is a log management platform.
Affected versions of this package are vulnerable to Insufficient Session Expiration such that in a multi-node Graylog cluster, after a user has explicitly logged out, a user session may still be used for API requests until it has reached its original expiry time. After a user has logged out, the UI shows the login screen again, which gives the user the impression that their session is not valid anymore. However, if the session becomes compromised later, it can still be used to perform API requests against the Graylog cluster. The time frame for this is limited to the configured session lifetime, starting from the time when the user logged out.
In a 2-node setup, with both nodes behind a load balancer:
Log in
Extract the session ID from the cookie
Log out and close the browser
Perform the following API request repeatedly with curl (with <session-id>
replaced with the session id from step 2 and <lb-host>
replaced with the hostname of your load balancer):
curl -I -H X-Graylog-No-Session-Extension:true https://<session-id>:session@<lb-host>/api/system/cluster/nodes