CVE-2023-1543:
Answer vulnerable to Insufficient Session Expiration
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.19725%
CWE
Published
3/21/2023
Updated
3/23/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/answerdev/answer | go | < 1.0.6 | 1.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from incomplete session invalidation during logout. The patch adds 'RemoveAdminUserCacheInfo' to the logout flow, indicating the original UserLogout function in user_controller.go only cleared regular user cache (via RemoveUserCacheInfo) but not admin privileges cache. This left admin access tokens valid after logout, creating insufficient session expiration. The direct correlation between the CWE-613 description, commit message about admin cache removal, and the specific code change in the logout handler provides high confidence in this assessment.