<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Rails — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/rails/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/rails/feed.xml" rel="self" type="application/rss+xml"/><item><title>Katalyst Koi Session Cookies Replayable After Logout</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-katalyst-koi-session-replay/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-katalyst-koi-session-replay/</guid><description>Katalyst Koi versions before 4.20.0 and between 5.0.0 and 5.6.0 fail to invalidate admin session cookies upon logout, allowing attackers with a valid cookie to maintain unauthorized access.</description><content:encoded><![CDATA[<p>Katalyst Koi is vulnerable to a session replay attack where admin session cookies are not invalidated when an admin user logs out. This vulnerability allows an attacker who has previously obtained a valid admin session cookie to continue accessing admin functionalities even after the legitimate admin user has logged out. The unauthorized access persists until the cookie expires or the session secrets are rotated. This issue affects applications using Koi admin authentication, where admin session cookies may have been exposed through various means, such as caching, interception, or retention. Users should upgrade to the patched Koi releases (4.20.0 or 5.6.0) to mitigate this vulnerability. The vulnerability was published May 7, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a valid admin session cookie, potentially through network sniffing, cross-site scripting (XSS), or stolen credentials.</li>
<li>A legitimate admin user authenticates to the Katalyst Koi application and receives a session cookie.</li>
<li>The attacker intercepts or otherwise obtains a copy of this valid admin session cookie.</li>
<li>The legitimate admin user logs out of the Katalyst Koi application.</li>
<li>The Katalyst Koi application fails to invalidate the existing admin session cookie upon logout.</li>
<li>The attacker replays the stolen admin session cookie in subsequent requests to the Katalyst Koi application.</li>
<li>The Katalyst Koi application incorrectly authenticates the attacker, granting them continued access to admin functionalities.</li>
<li>The attacker performs unauthorized actions within the application, such as modifying data, changing configurations, or accessing sensitive information until the cookie expires.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to maintain persistent, unauthorized access to administrative functions within the Katalyst Koi application. The impact can include data breaches, unauthorized modifications to the application configuration, and potential compromise of sensitive user data. The vulnerability impacts all applications using Koi admin authentication where an admin session cookie may have been exposed, cached, intercepted, or otherwise retained after logout.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Katalyst Koi version 4.20.0 or 5.6.0, or backport the fix to invalidate session cookies after logout, as recommended in the advisory.</li>
<li>Implement multi-factor authentication (MFA) to reduce the risk of session cookie theft.</li>
<li>Deploy the Sigma rule to detect unauthorized access using replayed session cookies.</li>
<li>Monitor web server logs for suspicious activity related to session management (e.g., unusual cookie usage) to identify potential exploitation attempts.</li>
<li>Review and update session management policies to ensure session cookies are properly invalidated upon logout.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>session-replay</category><category>vulnerability</category><category>authentication</category></item></channel></rss>