Welcome to WebmasterWorld Guest from 54.242.165.26

Forum Moderators: phranque

Message Too Old, No Replies

Ruby on Rails Cookiestore Vulnerability

     
11:34 am on Nov 28, 2013 (gmt 0)

Administrator from GB 

WebmasterWorld Administrator engine is a WebmasterWorld Top Contributor of All Time 10+ Year Member Top Contributors Of The Month Best Post Of The Month

joined:May 9, 2000
posts:22695
votes: 286


Back in September, security researcher G.S. McNamara warned that certain Ruby on Rails versions were plagued by a vulnerability that allowed hackers to hijack user sessions. Last week, the researcher provided a list of website that were vulnerable.

The security hole stems from the use of CookieStore, which holds the user session hash in the web browser as a cookie. However, even after a new cookie is created, the old one is still valid, which means that it can be used to hijack user accounts.

This is known as insufficient session expiration weakness. The expert warns that this type of flaw is particularly dangerous on websites that donít use SSL. Ruby on Rails Cookiestore Vulnerability [news.softpedia.com]
Itís also worth noting that while only Ruby on Rails versions older than 4.0 donít encrypt cookies by default, cybercriminals can abuse even encrypted cookies to hijack accounts.
1:06 pm on Nov 28, 2013 (gmt 0)

Senior Member from LK 

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month

joined:Nov 16, 2005
posts: 2467
votes: 29


Django is also vulnerable to this if you use use cookie storage for sessions, but this is not the default.

Also, any site that does not use SSL for all logged in users is vulnerable to a MITM attack. The difference here is that the window of opportunity is larger.
 

Join The Conversation

Moderators and Top Contributors

Hot Threads This Week

Featured Threads

Free SEO Tools

Hire Expert Members