Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://github.com/FactorJS/factor/blob/v1.8.30/@factor/user/util.ts#L65", "name": "https://github.com/FactorJS/factor/blob/v1.8.30/@factor/user/util.ts#L65", "tags": ["Patch", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985", "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985", "tags": ["Third Party Advisory"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user\u2019s session even after the user logs out of the application. In addition, user sessions are stored in the browser\u2019s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-613"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2021-25985", "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "acInsufInfo": false, "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}}, "publishedDate": "2021-11-16T10:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:darwin:factor:*:*:*:*:*:node.js:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.8.30", "versionStartIncluding": "1.0.4"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-11-18T21:17Z"}