Skip to content
This repository has been archived by the owner on Dec 4, 2023. It is now read-only.

CVE-2020-14319: Deny mutation operations unless an existing session exists #5091

Merged
merged 2 commits into from
Jul 29, 2020

Conversation

k-wall
Copy link
Member

@k-wall k-wall commented Jul 29, 2020

Type of change

  • Bugfix

Description

To guard against a possible CSRF with some older browsers, apply the same-site cookie option strict to the console-server's session cookie, and deny mutation operations for requests that don't already have a session.

Checklist

  • Update/write design documentation in ./documentation/design
  • Write tests and make sure they pass
  • Update documentation
  • Check RBAC rights for Kubernetes / OpenShift roles
  • Try your changes from Pod inside your Kubernetes and OpenShift cluster, not just locally
  • Reference relevant issue(s) and close them after merging
  • Update CHANGELOG.md

vbusch
vbusch previously approved these changes Jul 29, 2020
Copy link
Contributor

@vbusch vbusch left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@k-wall k-wall merged commit 5cf63dd into EnMasseProject:master Jul 29, 2020
@k-wall k-wall deleted the CVE-2020-14319 branch July 29, 2020 18:17
k-wall added a commit that referenced this pull request Jul 29, 2020
…xists (#5091)

* CVE-2020-14319: Deny mutation operations unless an existing session exists

* Disable unit tests

(cherry picked from commit 5cf63dd)
@k-wall k-wall added this to the 0.32.2 milestone Jul 29, 2020
k-wall added a commit that referenced this pull request Jul 29, 2020
k-wall added a commit that referenced this pull request Jul 29, 2020
(cherry picked from commit 557ebfc)
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants