In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover.
References
Link | Resource |
---|---|
https://github.com/FactorJS/factor/blob/v1.8.30/@factor/user/util.ts#L65 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985 | Third Party Advisory |
Configurations
Information
Published : 2021-11-16 02:15
Updated : 2021-11-18 13:17
NVD link : CVE-2021-25985
Mitre link : CVE-2021-25985
JSON object : View
CWE
CWE-613
Insufficient Session Expiration
Products Affected
darwin
- factor