[jira] [Updated] (OFBIZ-11470) Ensure that the SameSite attribute is set to 'strict' for all cookies. (CVE-2019-0235)

2020-04-06 Thread Jacques Le Roux (Jira)


 [ 
https://issues.apache.org/jira/browse/OFBIZ-11470?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jacques Le Roux updated OFBIZ-11470:

Summary: Ensure that the SameSite attribute is set to 'strict' for all 
cookies. (CVE-2019-0235)  (was: Ensure that the SameSite attribute is set to 
'strict' for all cookies.)

> Ensure that the SameSite attribute is set to 'strict' for all cookies. 
> (CVE-2019-0235)
> --
>
> Key: OFBIZ-11470
> URL: https://issues.apache.org/jira/browse/OFBIZ-11470
> Project: OFBiz
>  Issue Type: Sub-task
>  Components: ALL APPLICATIONS
>Affects Versions: Trunk
>Reporter: Jacques Le Roux
>Assignee: Jacques Le Roux
>Priority: Major
> Fix For: 18.12.01, 17.12.02
>
>
> As reported by OWASP ZAP:
> bq. A cookie has been set without the SameSite attribute, which means that 
> the cookie can be sent as a result of a 'cross-site' request. The SameSite 
> attribute is an effective counter measure to cross-site request forgery, 
> cross-site script inclusion, and timing attacks.
> The solution was not obvious in OFBiz for 2 reasons:
> # There is no HttpServletResponse::setHeader. So we need to use a filter 
> (SameSiteFilter) and even that is not enough because of 2:
> # To prevent session fixation we force Tomcat to generates a new jsessionId, 
> ultimately put in cookie, in LoginWorker::login. So we need to add a call to 
> SameSiteFilter::addSameSiteCookieAttribute in 
> UtilHttp::setResponseBrowserDefaultSecurityHeaders.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (OFBIZ-11470) Ensure that the SameSite attribute is set to 'strict' for all cookies.

2020-03-20 Thread Jacques Le Roux (Jira)


 [ 
https://issues.apache.org/jira/browse/OFBIZ-11470?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jacques Le Roux updated OFBIZ-11470:

Description: 
As reported by OWASP ZAP:

bq. A cookie has been set without the SameSite attribute, which means that the 
cookie can be sent as a result of a 'cross-site' request. The SameSite 
attribute is an effective counter measure to cross-site request forgery, 
cross-site script inclusion, and timing attacks.

The solution was not obvious in OFBiz for 2 reasons:

# There is no HttpServletResponse::setHeader. So we need to use a filter 
(SameSiteFilter) and even that is not enough because of 2:
# To prevent session fixation we force Tomcat to generates a new jsessionId, 
ultimately put in cookie, in LoginWorker::login. So we need to add a call to 
SameSiteFilter::addSameSiteCookieAttribute in 
UtilHttp::setResponseBrowserDefaultSecurityHeaders.

  was:
As reported by OWASP ZAP:

bq. A cookie has been set without the SameSite attribute, which means that the 
cookie can be sent as a result of a 'cross-site' request. The SameSite 
attribute is an effective counter measure to cross-site request forgery, 
cross-site script inclusion, and timing attacks.

The solution was not obvious in OFBiz for 2 reasons:

# There is no HttpServletResponse::setHeader. So we need to use a filter 
(SameSiteFilter) and even that is not enough because of 2:
# To prevent session fixation we force Tomcat to generates a new jsessionId, 
ultimately put in cookie, in LoginWorker::login. So we need to add a call to 
SameSiteFilter::addSameSiteCookieAttribute in 
setResponseBrowserDefaultSecurityHeaders.


> Ensure that the SameSite attribute is set to 'strict' for all cookies.
> --
>
> Key: OFBIZ-11470
> URL: https://issues.apache.org/jira/browse/OFBIZ-11470
> Project: OFBiz
>  Issue Type: Sub-task
>  Components: ALL APPLICATIONS
>Affects Versions: Trunk
>Reporter: Jacques Le Roux
>Assignee: Jacques Le Roux
>Priority: Major
>
> As reported by OWASP ZAP:
> bq. A cookie has been set without the SameSite attribute, which means that 
> the cookie can be sent as a result of a 'cross-site' request. The SameSite 
> attribute is an effective counter measure to cross-site request forgery, 
> cross-site script inclusion, and timing attacks.
> The solution was not obvious in OFBiz for 2 reasons:
> # There is no HttpServletResponse::setHeader. So we need to use a filter 
> (SameSiteFilter) and even that is not enough because of 2:
> # To prevent session fixation we force Tomcat to generates a new jsessionId, 
> ultimately put in cookie, in LoginWorker::login. So we need to add a call to 
> SameSiteFilter::addSameSiteCookieAttribute in 
> UtilHttp::setResponseBrowserDefaultSecurityHeaders.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)