-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hash of the password stored in the cookies #2470
Comments
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Shall I ask for a CVE for this? |
Huh, sorry, no idea how this report was missed. We'll address it in v0.105.2 |
Merge in DNS/adguard-home from 2470-session-token to master Updates #2470. Squashed commit of the following: commit 02e8744 Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Mar 1 20:11:35 2021 +0300 home: imp time formating commit 6f4a6c9 Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Mar 1 18:48:15 2021 +0300 home: rm user's data from session token
The solution you proposed is implemented in snapshot 94e783d. All new cookies provided by AGH now have 128-bit random string as the value and don't contain any user's information. Could you please verify if it's secure enough for you? |
Looks good to me, thanks! |
This has been assigned CVE-2021-27935 |
Merge in DNS/adguard-home from 2470-session-token to master Updates AdguardTeam#2470. Squashed commit of the following: commit 02e8744 Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Mar 1 20:11:35 2021 +0300 home: imp time formating commit 6f4a6c9 Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Mar 1 18:48:15 2021 +0300 home: rm user's data from session token
It seems that the username as well as the bcrypt'ed password have their sha256 stored in the cookie.
This is a bit worrying, since an attacker able to get the cookie would not only gain access to AGH, but also be able to bruteforce offline the password. A possible way to address this would be to use a random string instead of
sha256(salt | username | bcrypt(password))
.The text was updated successfully, but these errors were encountered: