You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When the admin deletes the user or changes the user's password, the user's current valid session/token has not expired, leading to the old session/token still being valid.
This would lead to CWE-613 insufficient session expire weakness.
Attack Example
admin login, user1 login;
admin delete user1 or changing user1's password to default;
user1 can still operate with the old session/token which should be expired.
Description
When the admin deletes the user or changes the user's password, the user's current valid session/token has not expired, leading to the old session/token still being valid.
This would lead to CWE-613 insufficient session expire weakness.
Attack Example
Deleting user by admin
lin-cms-spring-boot/src/main/java/io/github/talelin/latticy/controller/cms/AdminController.java
Lines 71 to 77 in 3fc25bd
Changing password
lin-cms-spring-boot/src/main/java/io/github/talelin/latticy/controller/cms/AdminController.java
Lines 63 to 69 in 3fc25bd
lin-cms-spring-boot/src/main/java/io/github/talelin/latticy/controller/cms/UserController.java
Lines 125 to 130 in 3fc25bd
lin-cms-spring-boot/src/main/java/io/github/talelin/latticy/service/impl/UserIdentityServiceImpl.java
Lines 55 to 61 in 3fc25bd
The text was updated successfully, but these errors were encountered: