View Issue Details

IDProjectCategoryView StatusLast Update
0012277mantisbtsecuritypublic2011-08-05 02:25
Reporterpklanka Assigned Todhx  
PrioritynormalSeveritymajorReproducibilityalways
Status closedResolutionduplicate 
PlatformAllOSAllOS Versionall
Product Version1.1.8 
Summary0012277: Cookie tokens are constant for a particular user
Description

Mantis does not use randomized tokens for the users; rather it uses same token as the session ID, everytime a user logs in. Stealing the cookie token could result in the hijack of session.

Steps To Reproduce

Login as a user, obtain a session ID. Logout, Clear sessions, Close browser and Relogin again - Obtain same old session ID.

TagsNo tags attached.

Relationships

duplicate of 0009810 acknowledged login cookie never changes 
duplicate of 0011296 acknowledged Mantis BT is using fix cookies in the DB 

Activities

jreese

jreese

2010-08-23 07:52

reporter   ~0026413

If you're worried about someone listening over the line that could hijack session tokens, SSL is really the only solution to this, whether the token changes or stays constant.

pklanka

pklanka

2010-08-23 08:45

reporter   ~0026417

I guess even SSL would not be of much help. HTTP snooping is not the only way a attacker could obtain the session ID. Sometimes an attacker could use other vulnerabilities in the system / domain pages and obtain the session ID of the user. E.g. If in case there is XSS in some Mantis page or page in the same domain (where Mantis is installed); attacker could easily obtain the session ID of the user and impersonate him / her.

Also, in this particular case, session ID snooping has larger implication - since it is non random and it directly makes the requirement of a username and password redundant.

dhx

dhx

2010-08-23 09:50

reporter   ~0026420

@pklanka: I added HttpOnly cookie security in 1.2.0 which is a security feature now supported by all the major browsers that I'm aware of. This feature prevents sensitive cookies like the session IDs being read from within JavaScript code running on the site.

I do agree we need to rotate session IDs between multiple user logins. I thought we would have been doing this already with the PHP session cookies. In other words, I think MantisBT uses both PHP and custom session IDs. I've never looked into this area a great deal so I'll try to investigate it further.

@jreese, do you know how MantisBT treats PHP vs MantisBT session IDs?