Impact
The vulnerability in Graylog Web Interface 2.2.3 allows a session identifier that was issued during a prior login to remain valid even after a new login occurs. Each authentication generates a new sessionId but does not properly invalidate previous ones. Consequently, a compromised or leaked sessionId can be replayed, enabling an attacker to authenticate as that user, interact with the API or web interface, and alter the contents under that account, thereby compromising integrity of user data and system operations.
Affected Systems
Graylog Web Interface, specifically version 2.2.3. All earlier Graylog releases are considered obsolete and unpatched for this issue.
Risk and Exploitability
The CVSS severity score is 9.3, indicating high impact. The EPSS score is below 1%, suggesting a low but nonzero exploitation probability. The vulnerability is not currently listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker would need remote access to the Graylog web service or API, typically via port 9000 or an HTTPS endpoint, to capture a sessionId and then replay it. The primary attack vector is remote through HTTP(S) requests, with the prerequisite of obtaining or intercepting a valid sessionId.
OpenCVE Enrichment