First published: Tue Nov 16 2021(Updated: )
In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Darwin Factor | >=1.0.4<=1.8.30 |
Update to 3.0.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.