|
Message-ID: <524E46C1.6020900@redhat.com> Date: Thu, 03 Oct 2013 22:40:33 -0600 From: Kurt Seifried <kseifried@...hat.com> To: Open Source Security <oss-security@...ts.openwall.com> Subject: A note on cookie based sessions -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 So this has been published: http://maverickblogging.com/logout-is-broken-by-default-ruby-on-rails-web-applications/ http://maverickblogging.com/security-vulnerability-with-django-cookie-based-sessions/ Basically it boils down to this: cookie based session handling where you don't store state data on the backend, but instead have a cookie, possibly with an expiration time coded into it can be used in replay attacks. That's a problem, but also an inherent limitation of how such session handling works. The advantages are a stateless backend, no need for state DB, if you have many backends, especially distributed, logins just work no matter which server you connect to. In both Drupal and Ruby on Rails case the security issues are documented: https://docs.djangoproject.com/en/1.5/topics/http/sessions/#using-cookie-based-sessions http://guides.rubyonrails.org/action_controller_overview.html#session the documentation can maybe be improved (especially mentioning HTTPS/HSTS to prevent sniffing of the cookie) but generally speaking this is covered, so no CVEs here. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) iQIcBAEBAgAGBQJSTkbBAAoJEBYNRVNeJnmTnI8QAJyoi0yWRmTzVHUiwMx/mcSa eum+9cMtxLi/TvB7KMtXJqCE9tRZ11R8gCqLpzxyuKOnFUoh2pK0OSm9oz2r0nkK xUsshwcEy9a4Ih9ICdPUBo9APQ8LoW0rGCqACP/BjKSs41As1IiJzN/wAm/Oshmj 8n66ERqdpTeQlYfQQqHsAk3mbI4k9kKvYnO6yMrQe2GJ5vPW97O3FiSqasg8oqvt rvO6tdTElKfYIbp9JdgduMsNwyXsTSHUf4j2yW71NJHYf1Rh/CkldG1Q69Y3gCAo huYRBL/vzN3vDPhFWufovS7iHjSDDc20Uorxu7OO7WKp30yk9OpZZh/hx5myHQhd kZiaA9Zc2MkW8Fum1+onAJUqVJuAg8CH0ChABorCNhepvAfptS32UNFr9eBLVpxy +YfXkMFV6aW9549SuUHOjOsXXNfctjaVx+e0gvPwYilCj5On8FlNoCCJGA1QtA3P 9B6GCc8TfHd7+5wx3qOTMTJhbxUg2R6sZ+NLwxLYgjd+sImYnbRFBhjo+EtUXMEp iPWdsC6zXnFhciUcznf+Ggg3gNRVVkH9cZUnczmR4nFe2tT6Gu6B75juzXQWG4rq 51Tl2TfiSGgVzSlHBksvtmJSBv9GO84JtH0hrI1u40h4HBvjJNJNZr8kILKIGXBu 27G8kN5NeQh+oEYmIL9d =rjhT -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.