Forum OpenACS Development: Security Issue? Session Identifier Not Updated
We've got two posting on our ]project-open[ SourceForge tracker that I've only discovered today as I'm reviewing everything before an upcoming ]po[ V5.0 release:
I'm not sure if these issues already influenced OpenACS 5.9.
The first one seems valid to me on first sight, while we weren't capable to reproduce the 2nd one. Also, we had quite an intensive security audit by a Washington cyber-war company in March, and these issues didn't come up. (There were a few other ones, which I communicated privately to Gustaf).
These reports are more than two years old (may 2014)! On which version of OpenACS was PO based on at this time?
The issue with the refreshing_p in ad_forms was fixed in march 2014 , the session_ids are secured via signatures since july 2014 . The xss and session_id security was checked various times since then, including leading open source tools (such as w3af) or commercial tools (acunetix), we have also regular security scans of our production site by a an external company.
so i doubt there are still issues, When you get vulnerability cans of recent versions indicating differently, please let me know (including the used tools) asap.
Thanks a lot for the reply.
I was neither aware of the refreshing_p issue nor of the fix. I did read about the signature for session_id, but didn't understand the relevance to this issue.
I'll cross-link this answer from our forums. I'll also post an advisory for ]po[ V4.0 now.
OpenACS 5.9.0 fixes many more other attack vectors related with cross site scripting. The forthcoming OpenACS 5.9.1 addresses more injection attacks (both cross site scripting and SQL injection) identified with newer scanning and provides as well framework support for CSRF attacks (cross site request forgery)