Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. Cosmos-server is vulnerable due to to the authorization header used for user login remaining valid and not expiring after log out. This vulnerability allows an attacker to use the token to gain unauthorized access to the application/system even after the user has logged out. This issue has been patched in version 0.13.0.
References
Link | Resource |
---|---|
https://github.com/azukaar/Cosmos-Server/security/advisories/GHSA-hpvm-x7m8-3c6x | Exploit Vendor Advisory |
https://github.com/azukaar/Cosmos-Server/security/advisories/GHSA-hpvm-x7m8-3c6x | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/azukaar/Cosmos-Server/security/advisories/GHSA-hpvm-x7m8-3c6x - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
29 Nov 2023, 20:53
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-29 20:15
Updated : 2024-11-21 08:32
NVD link : CVE-2023-49091
Mitre link : CVE-2023-49091
CVE.ORG link : CVE-2023-49091
JSON object : View
Products Affected
cosmos-cloud
- cosmos_server
CWE
CWE-613
Insufficient Session Expiration