[ 
https://jira.codehaus.org/browse/CONTINUUM-838?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Brett Porter closed CONTINUUM-838.
----------------------------------

    Resolution: Duplicate
      Assignee: Brett Porter
    
> Cross Site Request Forgery protection
> -------------------------------------
>
>                 Key: CONTINUUM-838
>                 URL: https://jira.codehaus.org/browse/CONTINUUM-838
>             Project: Continuum
>          Issue Type: Improvement
>          Components: Web interface
>    Affects Versions: 1.0, 1.0.1, 1.0.2, 1.0.3, 1.1-alpha-1
>            Reporter: Christian Gruber
>            Assignee: Brett Porter
>            Priority: Critical
>              Labels: backlog-to-cleanup
>
> XSRF vulnerabilities are very hard to fix.  More details on them at 
> http://en.wikipedia.org/wiki/Cross-site_request_forgery with a key document 
> found at http://isecpartners.com/documents/XSRF_Paper.pdf which outlines a 
> solution.
> In short, an XSRFProtectionToken is passed in each form in a hidden variable, 
> with the XSRFProtectionToken consisting of (pseudocode): 
> hash(sessionid + actionName + sitewide_secret);
> The hash can be MD5 or SHA-1 or whatever.  The important thing is that even 
> if a user is logged on with a valid sessionId, the attacker cannot know in 
> advance what the token will be without getting it out of an insecure browser 
> (in which case, you have other problems).   Even if the attacker gets access 
> to a token for one action that's less security-risky (like invoking a build), 
> they cannot then replay that token against something more risky (such as 
> creating a new admin user).

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://jira.codehaus.org/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to