-
Notifications
You must be signed in to change notification settings - Fork 228
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Password reset token leak via HTTP referer #40
Comments
If you open a PR for this, we can definitely take a look and push out a new version. We'd also want to push to the 0.9.x branch and fix the security issue if possible. |
Hi @athix The link offers 2 solutions: session based approach and immediate invalidation approach.
To complete these instructions, it's required to modify documentation and generated templates. The second approach is achieved by adding visited flag to database or session and modify |
I'm sorry I don't intend to reference the commits from this issue. It's a mistake. |
Hi @Ch4s3, would you suggest the way to go? I prefer the second way; because the most of the fix in the first way is about the documentation, it seems difficult to check if the modification is correct. |
Sorry, I've been awol for a bit. I'm reviewing now. |
* Add access_count_to_reset_password_page to migration/reset_password.rb * Add #increment_password_reset_page_access_counter and #reset_password_reset_page_access_counter. * Add #increment_password_reset_page_access_counter and #reset_password_reset_page_access_counter * Add test suites related to #increment_password_reset_page_access_counter and #reset_password_reset_page_access_counter. * Refactor `#increment_password_reset_page_access_counter` Change manual increment into using Sorcery::Adapters::ActiveRecordAdapter.increment.
The reset password token is leaking through the HTTP referer header ... This happens when user clicks at the link sent to their email and when the page is rendered with the token at the URL, if there is some subsequent requests to CDN/analytics or malicious JS , the token will be present at the REFERER header of this requests... As reported at here: https://robots.thoughtbot.com/is-your-site-leaking-password-reset-links A solution will be to store the token to session and then redirect to the page without the token at the URL ...
Is there any chance to change this behavior to current versions?
The text was updated successfully, but these errors were encountered: