
Cloud Vulnerability DB
A community-led vulnerabilities database
DSF FHIR Server with enabled OIDC authentication. DSF BPE Server with enabled OIDC authentication.
OIDC-authenticated sessions had no configured maximum inactivity timeout. Sessions persisted indefinitely after login, even after the OIDC access token expired.
If a user logs in via OIDC and leaves their browser without explicitly logging out, the session remains valid indefinitely. Another person using the same browser can access the DSF UI with the previous user's permissions. This is a realistic threat in hospital environments with shared workstations. Only affects OIDC browser sessions, not relevant for mTLS machine-to-machine communication.
dev.dsf.server.auth.oidc.session.timeout (default: PT30M).logoutWhenIdTokenIsExpired(true) in OpenID configuration to tie session lifetime to token lifetime.VIOLATED_POLICY when credentials expire, prevents stale websocket connections from continuing to receive events after session timeout.Source: NVD
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."