-
-
Notifications
You must be signed in to change notification settings - Fork 2.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Etherpad password only secured pads stores the specific pad password in plain-text cookies #230
Comments
We think this is something about avoid being prompted on second visit to a pad, the best solution is to use sessions instead so we should do that.. We did it this way initially because we didn't have support for sessions.. |
@eldiddio you might want to look into this one because it affects you directly. To replicate create a new pad on primarypad, click to set a password. Visit the pad, type in that password, look at your cookies. |
The reason we store the password in plain text is so we can check to see if the password has changed. To resolve this I will use our sessionStore and destroy any stored sessions for a pad(except the pad owner) when a password is changed, that will force the user to reauth to the new password ergo creating a new session :) |
I introduced Salting a while back so this could be used to encrypt the password. I'm not sure why I didn't propose that when I introduced salting, but yeah, basically tell the server to salt the password based on the sessionKey from settings.json.. Simples! |
bump @eldiddio |
Another one to ensure @rhelmer is aware of. |
FWIW you shouldn't use pad level passwords, your access should be done by session management. That's why this hasn't been actioned.. |
@muxator - sorry to be a pain, but browsing the issue tracker I found this one which IMO should be tagged |
Yeah, needs confirmation. Labeling for now. |
The logic is still in to set a password and to ask for a password and you set a password using the API. I'm +1 just dropping the "setPassword" API because we shouldn't be using anything but a mature authentication method for access to pads. @muxator thoughts on dropping Lots of other plugins / alternatives exist for access control so I'm totally fine with that.. |
Preamble: I still did not took the time to replicate this. I may be wrong.
Two alternatives. I am 55% for number 1.
|
+1 #2 I doubt anyone is using the +1 remove other redundant conversations. |
I'm gonna document what needs doing and then make a bounty as I won't have time to complete this work before I sign off. |
Well that was easy, took 5mins. #4178 |
From a security point of view this is bad. A cookie should not contain more than a session id or a (limited-time) token. The current behavior e.g. leaks an user's password with each XSS flaw.
The text was updated successfully, but these errors were encountered: