Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in azuracast/azuracast
Reported on
Aug 26th 2021
✍️ Description
The secure flag is not set for app_session cookie in the application.
🕵️♂️ Proof of Concept
PoC Image: https://i.ibb.co/v1y0Fdv/cookie-flag.png
💥 Impact
If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site.
Occurrences
References
Hey Melbin, I've just emailed the repo's maintainers for you. Waiting to hear back, good job!
We've applied a selective fix for this issue in the latest Rolling Release version of AzuraCast. See the following commit for details: https://github.com/AzuraCast/AzuraCast/commit/95a9b8c781736b526f18d390dbafd37751265713
The "secure only" flag on the cookie is only set if two factors are true:
- if the user has selected the "Require HTTPS" setting, and
- if the user is currently on a page with an HTTPS URL.
If these two settings are true, then we can reliably guarantee that the user intends to connect solely via HTTPS to their web application, so the "secure only" flag on the session cookie will cause no side effects.