# History 2013.05.11 Vulnerability reported to the vendor 2013.05.12 Vendor asked for details 2013.05.12 Details and exploit provided to the vendor 2013.05.30 Asked vendor about the status of investigation (no response) 2013.06.11 Sent another mail to the vendor (no response) 2013.06.15 Full disclosure
a month of no responses ??
should we get worried ? no ?
--
You received this message because you are subscribed to the Google Groups "Joomla! General Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email to joomla-dev-gene...@googlegroups.com.
To post to this group, send an email to joomla-de...@googlegroups.com.
Visit this group at http://groups.google.com/group/joomla-dev-general.
For more options, visit https://groups.google.com/groups/opt_out.
Just to be clear this is NOT a JBS task but a JSST task.
Is there anyone even on the JSST? I've never heard or seen anyone say they are. Who's the head of it that can explain the negligence?
--
http://developer.joomla.org/security.htmlThat doesn't give any names. It just says "contact the JSST"
On Wed, Jun 19, 2013 at 9:25 AM, Michael Babker <michael...@gmail.com> wrote:
On Wed, Jun 19, 2013 at 9:03 AM, Donald Gilbert <dilber...@gmail.com> wrote:
Is there anyone even on the JSST? I've never heard or seen anyone say they are. Who's the head of it that can explain the negligence?The bottom of every release notice on joomla.org talks about active JBS and JSST personnel.
--
You received this message because you are subscribed to the Google Groups "Joomla! General Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email to joomla-dev-general+unsub...@googlegroups.com.
Is there any feature beside 'remember me' that using JCryptCipherSimple ?
If you take a look at the history, there was a quick respond from the vendor (joomla).. Any idea who give the respond ? Probably he/she has strong reason to not put this issue on tracker...
--
Here is an older posting related to this issue. Not something new, that the remember-me cookie is so weakly encrypted:
http://jeffchannell.com/Joomla/joomla-remember-me-cookie-encryption-issues.html
--
Our current implementation requires a two-way algorithm, but I question the necessity of that.
For a short term solution, the easiest thing to create an announcement instructing users to disable the Remember Me plugin.
--
I've been speaking with Anthony about this, and at first he facepalmed and wondered why. Then he helped me come up with a valid solution to the problem. I'm putting together a POC and it doesn't require using external libraries.The approach would basically just store a random 32 bit token as the login cookie, and then grant access to the site based on that token. This is just as secure as using regular PHP session cookies.
I don't see a problem that the login token is stored in DB.
So are (hashed) user passwords.
The 'secret' key is/was used as a salt in JApplication::getHash:
https://github.com/joomla/joomla-cms/blob/master/libraries/legacy/application/application.php#L902
Maybe the solution could be to make the loginToken useless without
knowing the secret key (that's stored in configuration file)?
The used key is 32 characters long. The first block to encrypt is thus:
a:2:{s:8:"username";s:12:"the_us
My only objection to the current implementation (and Anthony's story) is that the cookie is now stored in the db. That makes it very insecure: for with a SQL-injection (or other way to maliciously retrieve info from the db) you can now login as any user whose cookie is stored in the db. I don't agree that that is "just as secure as using regular PHP session cookies", for they are only stored during the session, whereas those remember-me cookies are by default valid for a year and are not only available for logged in users. A safer solution would be to regenerate the token based on a combination of things in the db and some other source (for instance the "secret" from the config-file).
BTW an attack using the cookie as it was would be done via the (hacked) client computer. Storing the token in the db adds another attack-possibility (to retrieve the info via the db) while not securing the hole the client's computer very much. So the insecurity possibilities are increased, not decreased. Very good thing is to not store the password client-side, but the crappy "encryption" that is used for that is even worse. Not so much because of what is now presented as the hack (that you only need the first part of the username), but more because the key is just an MD5 of the HTTP-User-agent... which is a very limited set of strings. If the password is not stored in the cookie, that cannot be retrieved. But still the attacker can just login using that cookie.
--
By "safe storage" I meant that since we are using JCrypt::genRandomBytes(32) to create the token, there's the possibility of it containing a : - so exploding on : would be an issue.
To unsubscribe from this group and stop receiving emails from it, send an email to joomla-dev-general+unsub...@googlegroups.com.
Changing the minimum level mid release is a poor decision
Allowing installation on a version that means the install is insecure is a terrible decisionha
I will say also that my feeling is that used judiciously the CMS does have a lot of market power meaning that Joomla users will push hosts to upgrade if they get a strong security message in particular. And that's good for everyone.Elin
--
You received this message because you are subscribed to the Google Groups "Joomla! General Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email to joomla-dev-gene...@googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "Joomla! General Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email to joomla-dev-gene...@googlegroups.com.
>> >> email to joomla-dev-general+unsub...@googlegroups.com.
>> >> To post to this group, send an email to
>> >> joomla-de...@googlegroups.com.
>> >> Visit this group at http://groups.google.com/group/joomla-dev-general.
>> >> For more options, visit https://groups.google.com/groups/opt_out.
>> >>
>> >>
>> >
>> >
>> > --
>> > You received this message because you are subscribed to the Google
>> > Groups
>> > "Joomla! General Development" group.
>> > To unsubscribe from this group and stop receiving emails from it, send
>> > an
>> > email to joomla-dev-general+unsub...@googlegroups.com.
>> > To post to this group, send an email to
>> > joomla-de...@googlegroups.com.
>> > Visit this group at http://groups.google.com/group/joomla-dev-general.
>> > For more options, visit https://groups.google.com/groups/opt_out.
>> >
>> >
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "Joomla! General Development" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to joomla-dev-general+unsub...@googlegroups.com.
>> To post to this group, send an email to
>> joomla-de...@googlegroups.com.
>> Visit this group at http://groups.google.com/group/joomla-dev-general.
>> For more options, visit https://groups.google.com/groups/opt_out.
>>
>>
>
> --
> You received this message because you are subscribed to the Google Groups
> "Joomla! General Development" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to joomla-dev-general+unsub...@googlegroups.com.
> To post to this group, send an email to joomla-de...@googlegroups.com.
> Visit this group at http://groups.google.com/group/joomla-dev-general.
> For more options, visit https://groups.google.com/groups/opt_out.
>
>
--
You received this message because you are subscribed to the Google Groups "Joomla! General Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email to joomla-dev-general+unsub...@googlegroups.com.
To post to this group, send an email to joomla-de...@googlegroups.com.
Visit this group at http://groups.google.com/group/joomla-dev-general.
For more options, visit https://groups.google.com/groups/opt_out.
--
You received this message because you are subscribed to the Google Groups "Joomla! General Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email to joomla-dev-general+unsub...@googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to joomla-dev-gene...@googlegroups.com.
I think it would be an unfortunate loss of functionality if people were only able to use remember me on a single device.
If they do, what (if any) security issues have they encountered that we could learn from?
If they have changed, why and what do they do now?
I haven't delved into drupal, and don't know anyone on their Dev team, or I would have reached out myself.
Site security is such a big issue, so anything that we can do to improve the core is valuable.
Chris.
Hi Guys,
probably some of you might have notice this...
http://seclists.org/fulldisclosure/2013/Jun/149
it just launch to the public and now, even newbie hacker get invited to test this security hole....
what quite bugs me is when i looked at the history:# History 2013.05.11 Vulnerability reported to the vendor 2013.05.12 Vendor asked for details 2013.05.12 Details and exploit provided to the vendor 2013.05.30 Asked vendor about the status of investigation (no response) 2013.06.11 Sent another mail to the vendor (no response) 2013.06.15 Full disclosure
a month of no responses ??
should we get worried ? no ?