{"api_version":"1","generated_at":"2026-04-23T01:31:44+00:00","cve":"CVE-2019-3790","urls":{"html":"https://cve.report/CVE-2019-3790","api":"https://cve.report/api/cve/CVE-2019-3790.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-3790","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-3790"},"summary":{"title":"CVE-2019-3790","description":"The Pivotal Ops Manager, 2.2.x versions prior to 2.2.23, 2.3.x versions prior to 2.3.16, 2.4.x versions prior to 2.4.11, and 2.5.x versions prior to 2.5.3, contain configuration that circumvents refresh token expiration. A remote authenticated user can gain access to a browser session that was supposed to have expired, and access Ops Manager resources.","state":"PUBLIC","assigner":"security_alert@emc.com","published_at":"2019-06-06 19:29:00","updated_at":"2019-10-09 23:49:00"},"problem_types":["CWE-613"],"metrics":[],"references":[{"url":"https://pivotal.io/security/cve-2019-3790","name":"https://pivotal.io/security/cve-2019-3790","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"CVE-2019-3790: Ops Manager uaa client issues tokens after refresh token expiration | Security | Pivotal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/108512","name":"108512","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Pivotal Ops Manager CVE-2019-3790 Unauthorized Access Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-3790","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3790","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"3790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pivotal_software","cpe5":"operations_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"3790","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pivotal_software","cpe5":"operations_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ASSIGNER":"security_alert@emc.com","DATE_PUBLIC":"2019-05-28T13:47:10.000Z","ID":"CVE-2019-3790","STATE":"PUBLIC","TITLE":"Ops Manager uaa client issues tokens after refresh token expiration"},"source":{"discovery":"UNKNOWN"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Pivotal Ops Manager","version":{"version_data":[{"affected":"<","version_name":"2.3","version_value":"2.3.16"},{"affected":"<","version_name":"2.4","version_value":"2.4.11"},{"affected":"<","version_name":"2.2","version_value":"2.2.23"},{"affected":"<","version_name":"2.5","version_value":"2.5.3"}]}}]},"vendor_name":"Pivotal"}]}},"description":{"description_data":[{"lang":"eng","value":"The Pivotal Ops Manager, 2.2.x versions prior to 2.2.23, 2.3.x versions prior to 2.3.16, 2.4.x versions prior to 2.4.11, and 2.5.x versions prior to 2.5.3, contain configuration that circumvents refresh token expiration. A remote authenticated user can gain access to a browser session that was supposed to have expired, and access Ops Manager resources."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-324: Use of a Key Past its Expiration Date"}]}]},"references":{"reference_data":[{"refsource":"BID","name":"108512","url":"http://www.securityfocus.com/bid/108512"},{"refsource":"CONFIRM","url":"https://pivotal.io/security/cve-2019-3790","name":"https://pivotal.io/security/cve-2019-3790"}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N","version":"3.0"}}},"nvd":{"publishedDate":"2019-06-06 19:29:00","lastModifiedDate":"2019-10-09 23:49:00","problem_types":["CWE-613"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.5},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"2.4.0","versionEndExcluding":"2.4.11","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"2.3.0","versionEndExcluding":"2.3.16","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"2.2.0","versionEndExcluding":"2.2.23","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"2.5.0","versionEndExcluding":"2.5.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"3790","Ordinal":"141399","Title":"CVE-2019-3790","CVE":"CVE-2019-3790","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"3790","Ordinal":"1","NoteData":"The Pivotal Ops Manager, 2.2.x versions prior to 2.2.23, 2.3.x versions prior to 2.3.16, 2.4.x versions prior to 2.4.11, and 2.5.x versions prior to 2.5.3, contain configuration that circumvents refresh token expiration. A remote authenticated user can gain access to a browser session that was supposed to have expired, and access Ops Manager resources.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"3790","Ordinal":"2","NoteData":"2019-06-06","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"3790","Ordinal":"3","NoteData":"2019-06-06","Type":"Other","Title":"Modified"}]}}}