Improper Session Invalidation – Auto Sign-In Without Credentials After Logout (Affects Chrome & Firefox)

Disclosed: 2025-04-29 14:09:13 By pent0ss To dust
Medium
Vulnerability Details
## Summary: When a user logs out, the session is not invalidated properly. Revisiting the login page allows automatic re-authentication without any user input. This means the session remains active or is being improperly restored. Tested on: - Google Chrome - Mozilla Firefox Behavior is consistent across multiple browsers ## Steps To Reproduce: 1. Log in to the web application with a valid account. 2. Click on the "Logout" button. 3. Stay in the same browser, or open a new tab with the site. 4. Click on “Sign In” or visit the login page. ### Observe: User is automatically signed back in without entering email/password ## Expected Behavior: - On logout, all session tokens should be invalidated both client and server-side. - Revisiting the login page must not restore access without re-authentication ## Recommendation: - Properly invalidate the session on the server. - Remove all tokens/cookies from the browser. - Set cache-control headers to prevent session restoration via back/forward navigation. - Consider revoking refresh tokens where applicable ## Impact - Logout becomes meaningless, giving a false sense of security. - If someone else gains temporary or physical access to the browser, they can easily regain access to the account without credentials. - Risk is amplified in environments like internet cafés, libraries, or if a device is lost/stolen.
Actions
View on HackerOne
Report Stats
  • Report ID: 3101207
  • State: Closed
  • Substate: resolved
  • Upvotes: 9
Share this report