You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The caddy-security plugin lacks proper user session invalidation upon clicking the “Sign Out” button; user sessions remain valid even after requests are sent to /logout and /oauth2/google/logout. Attackers who gain access to an active but supposedly logged-out session can perform unauthorized actions on behalf of the user.
To address this issue, review the sign-out process to identify the cause of the unexpected behavior. Ensure that the /oauth2/google/logout endpoint correctly terminates the user session and invalidates the associated tokens.
Severity: Low
The caddy-security plugin lacks proper user session invalidation upon clicking the “Sign Out” button; user sessions remain valid even after requests are sent to
/logout
and/oauth2/google/logout
. Attackers who gain access to an active but supposedly logged-out session can perform unauthorized actions on behalf of the user.To address this issue, review the sign-out process to identify the cause of the unexpected behavior. Ensure that the
/oauth2/google/logout
endpoint correctly terminates the user session and invalidates the associated tokens.For more defense in depth, use the OWASP Application Security Verification Standard (V3 Session Management) to check whether the implementation handles sessions securely.
More information about our Caddy Security public disclosure:
The text was updated successfully, but these errors were encountered: