Afair also only client side state saving is affected (please correct me if I am wrong), server side state saving which the majority of users use, should be safe.

Werner


Am 10.06.10 08:54, schrieb Leonardo Uribe:
Hi

The actions has been already taken. Release for myfaces core 1.1.8 and
1.2.9 are on the way and we are working hard to get 2.0.1 out.
Unoficially, you can find it here:

http://people.apache.org/~lu4242/myfaces129/org/apache/myfaces/core/
http://people.apache.org/~lu4242/myfaces118/org/apache/myfaces/core/

I hope to publish them on public maven repo soon (we already have the
required votes).

Both myfaces and mojarra only encrypt the state. What is missing is add
a message authentication code (MAC) to the encryption to prevent this
type of attack.

The problem can be solved if users change to server side state saving,
because on the view state only a identifier is sent and no changes on
the component tree could be done with this configuration.

I hope to update the wiki page that talks about security soon too.

regards,

Leonardo Uribe

2010/6/10 Mark Struberg <[email protected] <mailto:[email protected]>>

    Hi!

    Just got the following link over from JBoss people:

    http://www.theregister.co.uk/2010/06/08/padding_oracle_attack_tool/

    They claim that the way we do our client side state encryption is
    flawed (as is the one of Mojarra).
    Any actions we should take?

    LieGrue,
    strub






Reply via email to