CVE-2024-57433

7.5 HIGH

📋 TL;DR

This vulnerability in macrozheng mall-tiny 1.0.1 allows attackers to maintain access to user accounts even after logout due to improper token invalidation. The logout function fails to properly invalidate authentication tokens, enabling session hijacking and unauthorized access. All users of the affected version are impacted by this authentication bypass.

💻 Affected Systems

Products:
  • macrozheng mall-tiny
Versions: 1.0.1
Operating Systems: Any OS running the application
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the default configuration of the application. The vulnerability is in the logout functionality implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can hijack active user sessions to perform unauthorized actions, access sensitive data, escalate privileges, or maintain persistent access to compromised accounts.

🟠

Likely Case

Unauthorized access to user accounts leading to data exposure, account takeover, and potential manipulation of user-specific functionality.

🟢

If Mitigated

Proper token invalidation would prevent session persistence after logout, limiting attackers to only active sessions they can intercept.

🌐 Internet-Facing: HIGH - Web applications with authentication are typically internet-facing, making this vulnerability directly accessible to external attackers.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this if they have network access to the application, though external exposure is more concerning.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires obtaining a valid authentication token (through interception, XSS, or other means) and understanding the application's API structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - check for updates beyond 1.0.1

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Update to the latest version of macrozheng mall-tiny. 2. Verify the logout function properly invalidates tokens server-side. 3. Implement proper session management with token blacklisting or expiration.

🔧 Temporary Workarounds

Implement server-side token blacklisting

all

Maintain a server-side blacklist of invalidated tokens and check against it for all authenticated requests

Reduce token lifetime

all

Implement shorter token expiration times to limit the window of opportunity for token reuse

🧯 If You Can't Patch

  • Implement a reverse proxy or WAF rule to add custom headers and validate logout requests
  • Monitor authentication logs for unusual patterns of token reuse after logout events

🔍 How to Verify

Check if Vulnerable:

1. Log into the application. 2. Capture your authentication token. 3. Log out. 4. Attempt to use the same token to access authenticated endpoints. If successful, the system is vulnerable.

Check Version:

Check application configuration files or package.json for version information

Verify Fix Applied:

Repeat the vulnerable check steps - after logout, the same token should no longer work for authenticated requests.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful requests with the same token after logout events
  • Unusual token reuse patterns
  • Failed logout attempts

Network Indicators:

  • Authentication tokens being reused in requests after logout API calls
  • Lack of token invalidation in logout responses

SIEM Query:

source="application_logs" AND (event="logout" OR event="authentication") | stats count by user_id, token_id | where count > 1

🔗 References

📤 Share & Export