Cyber Posture

CVE-2024-57433

HighPublic PoC

Published: 31 January 2025

Published
31 January 2025
Modified
22 April 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0019 40.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57433 is a high-severity Improper Access Control (CWE-284) vulnerability in Macrozheng Mall-Tiny. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-12 (Session Termination) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-12 requires termination of user sessions upon logout, directly preventing continued access via still-valid tokens after logout.

prevent

IA-5 mandates proper management and revocation of authenticators like tokens upon logout, ensuring they cannot be used post-session termination.

prevent

AC-3 enforces approved access authorizations by validating token validity before granting access to protected resources.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

The vulnerability in the logout function of the public-facing web application (mall-tiny) constitutes an incorrect access control issue (T1190: Exploit Public-Facing Application), allowing attackers to continue using valid authentication tokens post-logout for unauthorized persistent access (T1078: Valid Accounts).

NVD Description

macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control via the logout function. After a user logs out, their token is still available and fetches information in the logged-in state.

Deeper analysisAI

CVE-2024-57433 is an Incorrect Access Control vulnerability (CWE-284) in macrozheng mall-tiny version 1.0.1, specifically affecting the logout function. After a user logs out, their authentication token remains valid and can continue to fetch information in a logged-in state. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to network accessibility and significant confidentiality impact.

Any unauthenticated attacker (PR:N) with network access (AV:N) who obtains a token from a user session—even after logout—can exploit this flaw. By submitting requests with the still-valid token, the attacker achieves unauthorized access to sensitive data that requires authentication, enabling high confidentiality breaches without privileges, user interaction, or disruption to integrity or availability.

The referenced advisory at https://github.com/peccc/restful_vul/blob/main/mall_tiny_logout_failed/mall_tiny_logout_failed.md provides technical details on the vulnerability, though specific patch or mitigation guidance is not detailed in available descriptions.

Details

CWE(s)

Affected Products

macrozheng
mall-tiny
1.0.1

CVEs Like This One

CVE-2024-57432Same product: Macrozheng Mall-Tiny
CVE-2024-57434Same product: Macrozheng Mall-Tiny
CVE-2026-25858Same vendor: Macrozheng
CVE-2026-25519Shared CWE-284
CVE-2025-66956Shared CWE-284
CVE-2026-30707Shared CWE-284
CVE-2025-23243Shared CWE-284
CVE-2026-40595Shared CWE-284
CVE-2025-66509Shared CWE-284
CVE-2025-27649Shared CWE-284

References