[ 
https://issues.apache.org/jira/browse/AIRFLOW-4185?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ash Berlin-Taylor updated AIRFLOW-4185:
---------------------------------------
    Priority: Minor  (was: Major)

This is low priority - if requests can be intercepted then the much is already 
lost.

 

 

> [security] ui - Logout does not invalidate the session correctly
> ----------------------------------------------------------------
>
>                 Key: AIRFLOW-4185
>                 URL: https://issues.apache.org/jira/browse/AIRFLOW-4185
>             Project: Apache Airflow
>          Issue Type: Bug
>          Components: security, ui
>            Reporter: t oo
>            Priority: Minor
>
> |The logout function for the Airflow application does not invalidate the 
> session cookies. A new cookie is typically issued on each new page or action, 
> leaving multiple cookies active until they reach the cookie expiry team. 
> After logout, the application may also be accessed again by pressing the back 
> button in the browser.|
> | | | | | |
> |A logout request is made with a session cookie.|
> |Successful requests are made to the server after logout using the same 
> cookie.|
> |After logging out, this cookie can also be used to make successful requests 
> to the server before its expiry.|
> |Business Impact/Attack Scenario| | | |
> |An attacker can replay the original session information to gain access to 
> the application after a logout has been completed, or return to the 
> application via the back button. |
> |Recommendation| | | | |
> |Logout needs to be configured to completely invalidate the session cookies 
> (client and server-side) to prevent replay attacks.
>  All protected pages need to check the authentication state and authorisation 
> role before performing any significant work, including rendering content.|



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to