DSF FHIR Server with enabled OIDC authentication. DSF BPE Server with enabled OIDC authentication.
OIDC-authenticated sessions had no configured maximum inactivity timeout. Sessions persisted indefinitely after login, even after the OIDC access token expired.
If a user logs in via OIDC and leaves their browser without explicitly logging out, the session remains valid indefinitely. Another person using the same browser can access the DSF UI with the previous user's permissions. This is a realistic threat in hospital environments with shared workstations.
Only affects OIDC browser sessions, not relevant for mTLS machine-to-machine communication.
dev.dsf.server.auth.oidc.session.timeout (default: PT30M).logoutWhenIdTokenIsExpired(true) in OpenID configuration to tie session lifetime to token lifetime.VIOLATED_POLICY when credentials expire, prevents stale websocket connections from continuing to receive events after session timeout.Exploitability
AV:PAC:LAT:NPR:NUI:NVulnerable System
VC:HVI:HVA:NSubsequent System
SC:NSI:NSA:N6.8/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N