Community
Participate
Working Groups
Build ID: 1.2 M6 Steps To Reproduce: 1. Go to a secured RAP application site (https) 2. Look at locally stored cookie information 3. See that some cookies are not secured even though the RAP application uses SSL. We are working on a patch.
Created attachment 134893 [details] Patch against 1.2M6 This patch checks whether the request is secure and sets the parameter of the cookie accordingly.
Created attachment 135386 [details] Patch that secures cookie and validates contents upon read Just as a paranoid addendum: The method getStoreId() in SettingStoreManager.java includes unvalidated data in an HTTP response header. The source of the unvalidated data is getStoreIdFromCookie(). This enables attacks such as cache-poisoning, cross-site scripting, cross-user defacement, page hijacking, cookie manipulation or open redirect.
Thanks Cole and Austin for pointing out these problems. I applied a modified version of the second patch to CVS.