Hello everyone,
A vulnerability has been disclosed to Plug. All applications that set cookies based on user input is vulnerable. The vulnerability affects code in the following format:
put_resp_cookie(conn, "username", conn.params["username"])
put_resp_cookie(conn, conn.params["username"], "valid")
In the code above, one of the cookie key or value is set based on user input, which may allow an attacker to set arbitrary headers.
We have released new Plug versions v1.0.6, v1.1.9, v1.2.5 and v1.3.5. If you can't upgrade immediately, we also include fixes you can directly add to your applications.
* Versions affected: v1.3.4 and early, v1.2.4 and earlier, v1.1.8 and earlier, v1.0.5 and earlier
* Versions fixed: v1.3.5+, v1.2.5+, v1.1.9+, v1.0.6+
* Reporter: Griffin Byatt
## Workarounds
The Plug documentation has always included the following advice in the `put_resp_cookie` documentation:
> The cookie value is not automatically escaped. Therefore, if you want to store values with comma, quotes, etc, you need to explicitly escape them or use a function such as `Base.encode64` when writing and `Base.decode64` when reading the cookie.
If you are following the advice above, you are **safe**.
If you can't upgrade immediately, we recommend encoding and decoding the value, per above, or at least make sure characters such as new lines carriage returns, commas and semi-colons are not present on the cookie value.
Instead of:
put_resp_cookie(conn, "username", conn.params["username"])
You may write:
username = conn.params["username"]
if String.contains?(username, ["\r", "\n", ";", ","]), do: raise "no donut for you"
put_resp_cookie(conn, "username", username)
## End of life for Plug v1.0.x
## Thanks
We want to thank Griffin Byatt for reporting this vulnerability.
José Valim
Skype: jv.ptec
Founder and Director of R&D