Welcome to WebmasterWorld Guest from 54.226.27.104

Forum Moderators: phranque

Message Too Old, No Replies

Ruby on Rails Cookiestore Vulnerability

     

engine

11:34 am on Nov 28, 2013 (gmt 0)

WebmasterWorld Administrator engine is a WebmasterWorld Top Contributor of All Time 10+ Year Member Top Contributors Of The Month Best Post Of The Month



Back in September, security researcher G.S. McNamara warned that certain Ruby on Rails versions were plagued by a vulnerability that allowed hackers to hijack user sessions. Last week, the researcher provided a list of website that were vulnerable.

The security hole stems from the use of CookieStore, which holds the user session hash in the web browser as a cookie. However, even after a new cookie is created, the old one is still valid, which means that it can be used to hijack user accounts.

This is known as insufficient session expiration weakness. The expert warns that this type of flaw is particularly dangerous on websites that donít use SSL. Ruby on Rails Cookiestore Vulnerability [news.softpedia.com]
Itís also worth noting that while only Ruby on Rails versions older than 4.0 donít encrypt cookies by default, cybercriminals can abuse even encrypted cookies to hijack accounts.

graeme_p

1:06 pm on Nov 28, 2013 (gmt 0)

WebmasterWorld Senior Member 5+ Year Member Top Contributors Of The Month



Django is also vulnerable to this if you use use cookie storage for sessions, but this is not the default.

Also, any site that does not use SSL for all logged in users is vulnerable to a MITM attack. The difference here is that the window of opportunity is larger.
 

Featured Threads

Hot Threads This Week

Hot Threads This Month