- Status Closed
 - 
		Assigned To
		
					
nferrari  - Private
 
Opened by nhlimon - 18.10.2025
Last edited by nferrari - 20.10.2025
FS#225 - Bug Bounty Report: Security Risk - Application Access Maintained After OAuth Revocation
Note: I was awarded a $500 reward for the same vulnerability reported to some other companies. They marked this as valid and attempted to fix the bug.
Summary: 
Revoking an application's access via the OAuth provider's settings should terminate the session in the main application. However, users are still logged in if the session remains active despite the OAuth disconnection.
Steps to Reproduce:
01. Log in to alwaysdata.com using Google OAuth.
02. Let's say an attacker hijacked your OAuth session, or you logged in to another device not owned by you and forgot to log out from there after using the account, and you wanted to destroy the OAuth session there.
03. Go to the Google OAuth provider’s settings from your Google account and revoke the application’s access.
04. You will see that, even after the OAuth provider disconnects, the session remains valid and doesn't terminate.
Mitigation: 
If a user’s OAuth access is revoked, force the application session to require re-authentication using OAuth. This ensures unauthorized sessions cannot continue.
Impact:
This flaw allows users or attackers with an active session to retain access even after OAuth access is revoked, creating a significant security risk and bypassing expected session termination mechanisms.
Loading...
Available keyboard shortcuts
- Alt + ⇧ Shift + l Login Dialog / Logout
 - Alt + ⇧ Shift + a Add new task
 - Alt + ⇧ Shift + m My searches
 - Alt + ⇧ Shift + t focus taskid search
 
Tasklist
- o open selected task
 - j move cursor down
 - k move cursor up
 
Task Details
- n Next task
 - p Previous task
 - Alt + ⇧ Shift + e ↵ Enter Edit this task
 - Alt + ⇧ Shift + w watch task
 - Alt + ⇧ Shift + y Close Task
 
Task Editing
- Alt + ⇧ Shift + s save task
 
	
Hi,
Thank you for your report. Unfortunately, Google does not provide any back-channel logout, thus we can't implement it.
Regards,