{"id":"CVE-2024-21492","details":"All versions of the package github.com/greenpau/caddy-security are vulnerable to Insufficient Session Expiration due to improper user session invalidation upon clicking the \"Sign Out\" button. User sessions remain valid even after requests are sent to /logout and /oauth2/google/logout. Attackers who gain access to an active but supposedly logged-out session can perform unauthorized actions on behalf of the user.","aliases":["GHSA-vp66-gf7w-9m4x","GO-2024-2557"],"modified":"2026-05-04T08:46:04.436518Z","published":"2024-02-17T05:15:08.223Z","withdrawn":"2026-05-04T08:46:04.436518Z","references":[{"type":"ADVISORY","url":"https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5920787"},{"type":"REPORT","url":"https://github.com/greenpau/caddy-security/issues/272"},{"type":"EVIDENCE","url":"https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-21492.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}