Forum OpenACS Development: Re: Security Issue? Session Identifier Not Updated
These reports are more than two years old (may 2014)! On which version of OpenACS was PO based on at this time?
The issue with the refreshing_p in ad_forms was fixed in march 2014 , the session_ids are secured via signatures since july 2014 . The xss and session_id security was checked various times since then, including leading open source tools (such as w3af) or commercial tools (acunetix), we have also regular security scans of our production site by a an external company.
so i doubt there are still issues, When you get vulnerability cans of recent versions indicating differently, please let me know (including the used tools) asap.
Thanks a lot for the reply.
I was neither aware of the refreshing_p issue nor of the fix. I did read about the signature for session_id, but didn't understand the relevance to this issue.
I'll cross-link this answer from our forums. I'll also post an advisory for ]po[ V4.0 now.
OpenACS 5.9.0 fixes many more other attack vectors related with cross site scripting. The forthcoming OpenACS 5.9.1 addresses more injection attacks (both cross site scripting and SQL injection) identified with newer scanning and provides as well framework support for CSRF attacks (cross site request forgery)