CVE-2023-49091

high-risk
Published 2023-11-29

Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. Cosmos-server is vulnerable due to to the authorization header used for user login remaining valid and not expiring after log out. This vulnerability allows an attacker to use the token to gain unauthorized access to the application/system even after the user has logged out. This issue has been patched in version 0.13.1.

Do I need to act?

-
0.44% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
NETWORK / LOW complexity

Affected Products (20)

Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server
Cosmos Server

Affected Vendors

61
/ 100
high-risk
Severity 30/34 · Critical
Exploitability 2/34 · Minimal
Exposure 29/34 · Critical