The Lab · 2026-04-01 23:27:07 · GitHub Issues
A critical open-redirect vulnerability in the ViUR framework's `get_cookie_for_app` endpoint allowed attackers to steal admin session cookies with a single malicious link. The flaw was in the endpoint's handling of the `redirect_to` parameter, which appended the user's session cookie as a plain query parameter to any s...
The Lab · 2026-04-03 11:27:06 · GitHub Issues
A low-severity but critical security vulnerability in the widely-used Rack Ruby web server interface has been patched. The flaw, detailed in a GitHub security advisory, could allow attackers to hijack user sessions through timing attacks. By meticulously measuring the time it takes for a system to look up a session ID,...
The Lab · 2026-04-18 01:22:43 · GitHub Issues
A critical security flaw has been identified in a JWT (JSON Web Token) implementation where refresh tokens are never invalidated after use. This creates a severe token replay vulnerability, allowing a single compromised refresh token to be reused indefinitely to generate new access tokens. The bug effectively grants an...
The Lab · 2026-04-18 02:22:30 · GitHub Issues
A critical security flaw has been identified in a JWT (JSON Web Token) implementation where refresh tokens are never invalidated after use. This creates a severe token replay vulnerability, allowing a single compromised refresh token to be reused indefinitely to generate new access tokens. The bug effectively grants an...
The Lab · 2026-04-18 02:22:31 · GitHub Issues
A critical security flaw has been identified in a JWT implementation where refresh tokens are never invalidated after use. This creates a token replay vulnerability, allowing a single compromised refresh token to be reused indefinitely to generate new access tokens. The bug effectively grants an attacker permanent acce...
The Lab · 2026-04-18 21:22:32 · GitHub Issues
A critical security flaw has been identified in a JWT implementation where refresh tokens are never invalidated after use. This creates a severe token replay vulnerability, allowing a single compromised refresh token to be reused indefinitely to generate new access tokens. The bug effectively grants an attacker permane...
The Vault · 2026-04-26 23:54:22 · GitHub Issues
A critical authentication vulnerability has been identified in the refresh token implementation. The system's token rotation mechanism fails to detect when a refresh token has already been reused, creating a window where a stolen token could be weaponized to maintain unauthorized access to a legitimate user's session.
...
The Lab · 2026-04-27 10:54:11 · GitHub Issues
A critical security vulnerability in the `POST /auth/refresh` endpoint fails to invalidate refresh tokens after rotation, allowing intercepted tokens to remain functional even after legitimate users have already rotated them. The flaw undermines the fundamental security guarantee of refresh token rotation—a mechanism d...
The Lab · 2026-05-04 18:54:12 · GitHub Issues
A critical security vulnerability has been identified in the `calculator` project's Django configuration, with a hardcoded SECRET_KEY directly embedded in the `settings.py` file. The flaw, mapped to CWE-798 (Use of Hard-coded Credentials), undermines cryptographic signing mechanisms protecting session cookies and passw...