CVE-2024-57433
Published: 31 January 2025
Summary
CVE-2024-57433 is a high-severity Improper Access Control (CWE-284) vulnerability in Macrozheng Mall-Tiny. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-12 (Session Termination) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-12 requires termination of user sessions upon logout, directly preventing continued access via still-valid tokens after logout.
IA-5 mandates proper management and revocation of authenticators like tokens upon logout, ensuring they cannot be used post-session termination.
AC-3 enforces approved access authorizations by validating token validity before granting access to protected resources.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability in the logout function of the public-facing web application (mall-tiny) constitutes an incorrect access control issue (T1190: Exploit Public-Facing Application), allowing attackers to continue using valid authentication tokens post-logout for unauthorized persistent access (T1078: Valid Accounts).
NVD Description
macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control via the logout function. After a user logs out, their token is still available and fetches information in the logged-in state.
Deeper analysisAI
CVE-2024-57433 is an Incorrect Access Control vulnerability (CWE-284) in macrozheng mall-tiny version 1.0.1, specifically affecting the logout function. After a user logs out, their authentication token remains valid and can continue to fetch information in a logged-in state. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to network accessibility and significant confidentiality impact.
Any unauthenticated attacker (PR:N) with network access (AV:N) who obtains a token from a user session—even after logout—can exploit this flaw. By submitting requests with the still-valid token, the attacker achieves unauthorized access to sensitive data that requires authentication, enabling high confidentiality breaches without privileges, user interaction, or disruption to integrity or availability.
The referenced advisory at https://github.com/peccc/restful_vul/blob/main/mall_tiny_logout_failed/mall_tiny_logout_failed.md provides technical details on the vulnerability, though specific patch or mitigation guidance is not detailed in available descriptions.
Details
- CWE(s)