Описание
All versions of the package github.com/greenpau/caddy-security are vulnerable to Insufficient Session Expiration due to improper user session invalidation upon clicking the "Sign Out" button. User sessions remain valid even after requests are sent to /logout and /oauth2/google/logout. Attackers who gain access to an active but supposedly logged-out session can perform unauthorized actions on behalf of the user.
Ссылки
- ExploitPress/Media CoverageThird Party Advisory
- Issue TrackingVendor Advisory
- Third Party Advisory
- ExploitPress/Media CoverageThird Party Advisory
- Issue TrackingVendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:authcrunch:caddy-security:-:*:*:*:*:*:*:*
EPSS
Процентиль: 77%
0.01065
Низкий
4.8 Medium
CVSS3
8.1 High
CVSS3
Дефекты
CWE-613
CWE-613
Связанные уязвимости
CVSS3: 4.8
github
почти 2 года назад
Insufficient Session Expiration in github.com/greenpau/caddy-security
EPSS
Процентиль: 77%
0.01065
Низкий
4.8 Medium
CVSS3
8.1 High
CVSS3
Дефекты
CWE-613
CWE-613