Vulnerability Details CVE-2018-13390
Unauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 before version 0.1.24 allows attackers on the same subnet to gain temporary AWS credentials for the users' roles.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 29.7%
CVSS Severity
CVSS v3 Score 6.1
CVSS v2 Score 4.8
Products affected by CVE-2018-13390
-
cpe:2.3:a:atlassian:cloudtoken:0.1.1
-
cpe:2.3:a:atlassian:cloudtoken:0.1.10
-
cpe:2.3:a:atlassian:cloudtoken:0.1.12
-
cpe:2.3:a:atlassian:cloudtoken:0.1.13
-
cpe:2.3:a:atlassian:cloudtoken:0.1.14
-
cpe:2.3:a:atlassian:cloudtoken:0.1.15
-
cpe:2.3:a:atlassian:cloudtoken:0.1.16
-
cpe:2.3:a:atlassian:cloudtoken:0.1.17
-
cpe:2.3:a:atlassian:cloudtoken:0.1.18
-
cpe:2.3:a:atlassian:cloudtoken:0.1.19
-
cpe:2.3:a:atlassian:cloudtoken:0.1.2
-
cpe:2.3:a:atlassian:cloudtoken:0.1.21
-
cpe:2.3:a:atlassian:cloudtoken:0.1.22
-
cpe:2.3:a:atlassian:cloudtoken:0.1.23
-
cpe:2.3:a:atlassian:cloudtoken:0.1.3
-
cpe:2.3:a:atlassian:cloudtoken:0.1.5
-
cpe:2.3:a:atlassian:cloudtoken:0.1.6
-
cpe:2.3:a:atlassian:cloudtoken:0.1.7
-
cpe:2.3:a:atlassian:cloudtoken:0.1.8
-
cpe:2.3:a:atlassian:cloudtoken:0.1.9