Vulnerabilities
Vulnerable Software
Rapid7:  >> Nexpose  >> 6.4.27  Security Vulnerabilities
Rapid7 Nexpose versions 6.5.50 and prior suffer from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage.
CVSS Score
8.7
EPSS Score
0.001
Published
2019-08-21
Versions of Nexpose prior to 6.4.66 fail to adequately validate the source of HTTP requests intended for the Automated Actions administrative web application, and are susceptible to a cross-site request forgery (CSRF) attack.
CVSS Score
8.8
EPSS Score
0.004
Published
2017-12-14
The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions. As a result, it falls back to allowing ALL algorithms supported by the relevant version of OpenSSH and makes the installations vulnerable to a range of MITM, downgrade, and decryption attacks.
CVSS Score
8.5
EPSS Score
0.002
Published
2017-06-06


Contact Us

Shodan ® - All rights reserved