mirror of
https://github.com/silverstripe/silverstripe-framework
synced 2024-10-22 14:05:37 +02:00
[CVE-2019-12203] Session fixation in "change password" form
A potential account hijacking may happen if an attacker has physical access to victim's computer to perform session fixation. Also possible if the targeted application contains an XSS vulnerability. Requires the victim to click the password reset link sent to their email. If all the above happens, attackers may reset the password before the actual user does that.
This commit is contained in:
parent
afcd966740
commit
a86093fee6
@ -719,6 +719,12 @@ class Security extends Controller implements TemplateGlobalProvider {
|
||||
$curMember->logOut();
|
||||
}
|
||||
|
||||
if (!headers_sent()) {
|
||||
// To avoid a potential session fixation attack
|
||||
// we're refreshing the session id so that it's
|
||||
// always new and random for every authentication
|
||||
session_regenerate_id(true);
|
||||
}
|
||||
// Store the hash for the change password form. Will be unset after reload within the ChangePasswordForm.
|
||||
Session::set('AutoLoginHash', $member->encryptWithUserSettings($_REQUEST['t']));
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user