ponzu-cms / ponzu

Headless CMS with automatic JSON API. Featuring auto-HTTPS from Let's Encrypt, HTTP/2 Server Push, and flexible server framework written in Go.
https://docs.ponzu-cms.org
BSD 3-Clause "New" or "Revised" License
5.67k stars 387 forks source link

Time of check to time of use vulnerability in ponzu cms #339

Open Loginsoft-Research opened 4 years ago

Loginsoft-Research commented 4 years ago

Vulnerability Description :- The Ponzu CMS is vulnerable to TOCTTOU attack. When an admin user deletes another admin user in the web application who is logged in at another system’s browser. After deleting, deleted admin user’s session will be active and he can perform any action in the web application, although his account is deleted.

Step To Reproduce :-

Create an admin user. Log in at another system’s browser. Delete that user. User session will be active.