Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <assp.014874dd79.828D4D77-DE9E-4ED1-93EB-865FC09A65B7@trwilliams.me.uk>
Date: Wed, 12 Mar 2014 20:46:14 +0000
From: Thomas Williams <thomas@...illiams.me.uk>
To: oss-security@...ts.openwall.com
Subject: Cookie Reuse

Hey guys

Would you consider the following scenario a security flaw:

- User can login to an authenticated system
- User copies the cookies that are set after they are authenticated
- User logs out and the cookies are therefore deleted from their system
- User can paste the previously copied cookies allowing them to re-auth without re-entering credentials

Personally, I would feel that given the user has logged out, their expectation is that not only should the cookies be removed from their end, but essentially those cookies should no longer be accepted by the server at a later stage to re-authenticate.

If you would feel this is a vulnerability, can anyone recommend the best way to disclose this to the developer?

Kind regards,
Thomas

Email scanned and verified safe. 


Content of type "text/html" skipped

Download attachment "smime.p7s" of type "application/pkcs7-signature" (2294 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.