Opened 4 years ago

Closed 4 years ago

Last modified 4 years ago

#32562 closed Bug (invalid)

Broken Authentication (Insecure CSRF and Session ID)

Reported by: cpulidomagentrack Owned by: nobody
Component: CSRF Version: 3.1
Severity: Normal Keywords:
Cc: cpulido@… Triage Stage: Unreviewed
Has patch: no Needs documentation: no
Needs tests: no Patch needs improvement: no
Easy pickings: no UI/UX: no

Description

We have currently carried out security tests on our system developed with Django, our security specialists report a vulnerability to us when a CSRF (Broken Authentication) token is obtained.

(Insecure CSRF and Session ID)), since if this token is obtained it is possible to reuse it several times allowing brute force attacks. Is it possible to modify the validity of this token or disable it when it is consumed in a post/put request and generate a new token within the session or limited the time valid from the inicial token CSRF ?

Change History (2)

comment:1 by Carlton Gibson, 4 years ago

Resolution: needsinfo
Status: newclosed

There's not sufficient detail here to assess. As well it's a security report and should not be made in public.

Please follow up with sufficient detail to reproduce to security@…

This is highlighted before creating an issue:

If your bug report is a security issue, DO NOT report it with a ticket. Please read our guide to reporting security issues.

comment:2 by Mariusz Felisiak, 4 years ago

Resolution: needsinfoinvalid
Note: See TracTickets for help on using tickets.
Back to Top