Lucene search

K
githubGitHub Advisory DatabaseGHSA-VP66-GF7W-9M4X
HistoryFeb 17, 2024 - 6:30 a.m.

Insufficient Session Expiration in github.com/greenpau/caddy-security

2024-02-1706:30:34
CWE-613
GitHub Advisory Database
github.com
6
github.com/greenpau/caddy-security
vulnerability
insufficient session expiration
improper user session invalidation
sign out
unauthorized actions

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

All versions of the package github.com/greenpau/caddy-security are vulnerable to Insufficient Session Expiration due to improper user session invalidation upon clicking the “Sign Out” button. User sessions remain valid even after requests are sent to /logout and /oauth2/google/logout. Attackers who gain access to an active but supposedly logged-out session can perform unauthorized actions on behalf of the user.

Affected configurations

Vulners
Node
github.com\/greenpau\/caddysecurityRange1.1.23

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Related for GHSA-VP66-GF7W-9M4X