View Issue Details

IDProjectCategoryView StatusLast Update
0027976mantisbtsecuritypublic2024-01-31 05:49
Reportervaibhs Assigned Todregad  
PriorityhighSeveritymajorReproducibilityalways
Status closedResolutionfixed 
Target Version2.24.5Fixed in Version2.24.5 
Summary0027976: CVE-2009-20001: User cookie string is not reset upon logout
Description

VULNERABILITY NAME: SESSION HIJACKING.

VULNERABILITY URL: https://bugs.kali.org/

DESCRIPTION:
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.

Please check this issue I sent this issue on https://bugs.kali.org/ but on there Mr. rhertzog said to send this issue on here that's why I send this issue here...please check and replay back regarding this vulnerability issue.

Steps To Reproduce

STEPS TO REPRODUCED:
1) Log in to your account
2) Copy your cookies
3) Logout
4) Clear browser cookies
5) Paste the cookies (copied in step 2)
6) Refresh the page
7) Now you will be logged into the account

Additional Information

The Patch:
Cookies should expire after the logout and previous cookies should not be used for logging into the account, they should expire!

IMPACT:

The malicious attacker can enter the server and access its information without having to hack a registered account. In addition, he can also make modifications on the server to help him hack it in the future or to simplify a data-stealing operation.

Please check this issue I sent this issue on https://bugs.kali.org/ but on there Mr. rhertzog said to send this issue on here that's why I send this issue here...please check and replay back regarding this vulnerability issue.

TagsNo tags attached.
Attached Files

Relationships

related to 0011296 acknowledged Mantis BT is using fix cookies in the DB 
has duplicate 0033587 closeddregad "MANTIS_STRING_COOKIE" cookie reusable after user logout 
related to 0028385 new The RSS url is functionnal a short time 

Activities

dregad

dregad

2021-02-13 13:02

developer   ~0065100

Thanks for your report.

In the future, please submit security issues as private, which avoids unwanted early general disclosure before we have time to review and possibly patch the issue. I would also kindly suggest you ask the people at kali.org to do the same for https://bugs.kali.org/view.php?id=7044.

I need to analyze this, but here are some preliminary remarks:

  • When logging in, users have options to restrict session validity to their current IP, which mitigates the risk
  • By default, the session cookie's validity is limited to the browser session; users also have the option to create a "permanent" cookie, if this feature is enabled by admin (see $g_allow_permanent_cookie) with a validity defined by $g_cookie_time_length (defaults to 1 year)
  • This behavior could be altered by custom authentication plugins, over which we have no control.
dregad

dregad

2021-02-13 13:24

developer   ~0065101

Also, as a side note, you're only hijacking yourself here... How would an attacker obtain your cookies (and use them, if you restrict your session by IP) ?

dregad

dregad

2021-02-13 15:41

developer   ~0065102

So after a quick check, I can confirm that we do delete the session cookie, when logging out, yet the behavior described does allow to login with the previously stored cookie string.

So the problem's root cause is actually the reuse of the cookie string, as discussed in 0011296.

Without going for a full rewrite as discussed there, we could probably mitigate the risk by invalidating the user's cookie string upon logout.

dregad

dregad

2021-02-13 19:55

developer   ~0065105

Proposed fix: PR https://github.com/mantisbt/mantisbt/pull/1737

Note: I'm setting this back to public, considering that it's basically the same issue as 0011296, which has been out in the open for over 12 years...

vaibhs

vaibhs

2021-02-15 06:20

reporter   ~0065124

Hello Team,
Sir this is a different issue than 0011296 because if you check that is also depend upon cookie but not as same issue which I sent. If the cookie editor copy the cookie and reusable that cookie if you are login in account then this is valid issue I get 600$ and 400$ for this issue from RDP program so please check and replay back again regarding my reward because this is valid issue.

Regards,
Vaibhav

dregad

dregad

2021-02-15 11:22

developer   ~0065126

@vaibhs I don't know what you're talking about. I never said the issue is not valid (I would have closed it if that were the case), in fact I even proposed a fix for it which is currently being discussed....

Also, no idea where this reward thing is coming from. If you're getting paid for it then good for you but it's not our concern.

dregad

dregad

2021-03-05 19:31

developer   ~0065181

Changed target to 2.24.5

dregad

dregad

2021-03-05 20:03

developer   ~0065185

CVE Request 1039557 sent

dregad

dregad

2021-03-11 20:20

developer   ~0065225

CVE-2009-20001 assigned

Related Changesets

MantisBT: master 6f369a5a

2021-02-13 12:33

dregad


Details Diff
Reset user session cookie string upon logout

When a user logs out from Mantis, we clear their session cookie string
(i.e. set mantis_user_table.cookie_string column to an empty string).
This ensures that anyone knowing its value is no longer able to login
with it.

On login, after successfully authenticating the user, when setting
the cookies in auth_set_cookies() we check if the cookie_string is
defined in the DB, and if not a new hash is generated and stored.

While not a complete fix for issue 0011296, this does improve the
situation by providing an easy and logical means for users to
effectively invalidate all their previous sessions.

Additionally, using an empty value to indicate an invalidated cookie
string instead of directly generating a new hash makes it easy to:
- identify user records which should be considered as logged out
(e.g. last_visit older than $g_cookie_time_length)
- invalidate login cookies (set them to '')
Leveraging this is left for future improvements.

Note: an empty string in the session cookie always triggers an anonymous
login (or sends the user back to login page if anonymous login is
disabled).

Fixes 0027976
Affected Issues
0011296, 0027976
mod - core/authentication_api.php Diff File

MantisBT: master d8181a54

2021-02-24 08:16

dregad


Details Diff
Set a new random cookie string upon logout

Per @vboctor's request in PR review [1].

This reverts the earlier implementation, where the cookie string was set
to '' and a new one generated at next login.

Fixes 0027976

[1]: https://github.com/mantisbt/mantisbt/pull/1737
Affected Issues
0027976
mod - core/authentication_api.php Diff File

MantisBT: master-2.24 79a78c09

2021-02-24 08:16

dregad


Details Diff
Set a new random cookie string upon logout

When a user logs out from Mantis, we reset their session cookie string.
This ensures that anyone knowing its value is no longer able to login
with it.

While not a complete fix for issue 0011296, this does improve the
situation by providing an easy and logical means for users to
effectively invalidate all their previous sessions.

Additionally, using an empty value to indicate an invalidated cookie
string instead of directly generating a new hash makes it easy to:
- identify user records which should be considered as logged out
(e.g. last_visit older than $g_cookie_time_length)
- invalidate login cookies (set them to '')
Leveraging this is left for future improvements.

Note: an empty string in the session cookie always triggers an anonymous
login (or sends the user back to login page if anonymous login is
disabled).

Fixes 0027976

(cherry picked from commit d8181a548e5131eede5d3b891bec0df68b472ba9)
Affected Issues
0011296, 0027976
mod - core/authentication_api.php Diff File