CVE-2024-57433
Published: 31 January 2025
Description
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Security Summary
CVE-2024-57433 is an Incorrect Access Control vulnerability (CWE-284) in macrozheng mall-tiny version 1.0.1, specifically affecting the logout function. After a user logs out, their authentication token remains valid and can continue to fetch information in a logged-in state. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to network accessibility and significant confidentiality impact.
Any unauthenticated attacker (PR:N) with network access (AV:N) who obtains a token from a user session—even after logout—can exploit this flaw. By submitting requests with the still-valid token, the attacker achieves unauthorized access to sensitive data that requires authentication, enabling high confidentiality breaches without privileges, user interaction, or disruption to integrity or availability.
The referenced advisory at https://github.com/peccc/restful_vul/blob/main/mall_tiny_logout_failed/mall_tiny_logout_failed.md provides technical details on the vulnerability, though specific patch or mitigation guidance is not detailed in available descriptions.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability in the logout function of the public-facing web application (mall-tiny) constitutes an incorrect access control issue (T1190: Exploit Public-Facing Application), allowing attackers to continue using valid authentication tokens post-logout for unauthorized persistent access (T1078: Valid Accounts).