[jbossseam-issues] [JBoss JIRA] Created: (JBSEAM-1361) sessionId cookie: man-in-the-middle attack

fguerzoni (JIRA) jira-events at lists.jboss.org
Mon May 28 17:48:08 EDT 2007


sessionId cookie: man-in-the-middle attack
------------------------------------------

                 Key: JBSEAM-1361
                 URL: http://jira.jboss.com/jira/browse/JBSEAM-1361
             Project: JBoss Seam
          Issue Type: Feature Request
          Components: Security
    Affects Versions: 1.2.1.GA
         Environment: general feature
            Reporter: fguerzoni


I noticed that sessionId cookie sent to client before authentication remains the same even after login succedeed. This could lead to a man-in-the-middle attack because pre-login sessionId could be easily sniffed.

So, it would be very nice if it should be possible to do a session switching on server side forcing a pre-login session invalidation and a new session creation (request.getSession(true)) as soon as client authenticates. Old session data should then be copied to new session.
In this case a new sessionId cookie will be sent to client: client will use this ticket during next requests.

This mechanism collides with the actual Seam implementations where Lifecycle.endSession is called after a session.invalidate
I think that Seam should automatically execute this task during the authentication phase. 

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: http://jira.jboss.com/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira

        



More information about the seam-issues mailing list