Bläddra i källkod

Fix password change/reset not immediately invalidating other sessions (#12928)

While making browser requests in the other sessions after a password
change or reset does not allow you to be logged in and correctly
invalidates the session making the request, sessions have API tokens
associated with them, which can still be used until that session
is invalidated.

This is a security issue for accounts that were already compromised
some other way because it makes it harder to throw out the hijacker.
master^2
Eugen Rochko 4 år sedan
committed by GitHub
förälder
incheckning
daf71573d0
Ingen känd nyckel hittad för denna signaturen i databasen GPG-nyckel ID: 4AEE18F83AFDEB23
3 ändrade filer med 14 tillägg och 1 borttagningar
  1. +6
    -0
      app/controllers/auth/passwords_controller.rb
  2. +7
    -0
      app/controllers/auth/registrations_controller.rb
  3. +1
    -1
      app/models/user.rb

+ 6
- 0
app/controllers/auth/passwords_controller.rb Visa fil

@@ -6,6 +6,12 @@ class Auth::PasswordsController < Devise::PasswordsController

layout 'auth'

def update
super do |resource|
resource.session_activations.destroy_all if resource.errors.empty?
end
end

private

def check_validity_of_reset_password_token


+ 7
- 0
app/controllers/auth/registrations_controller.rb Visa fil

@@ -22,10 +22,17 @@ class Auth::RegistrationsController < Devise::RegistrationsController
not_found
end

def update
super do |resource|
resource.clear_other_sessions(current_session.session_id) if resource.saved_change_to_encrypted_password?
end
end

protected

def update_resource(resource, params)
params[:password] = nil if Devise.pam_authentication && resource.encrypted_password.blank?

super
end



+ 1
- 1
app/models/user.rb Visa fil

@@ -247,7 +247,7 @@ class User < ApplicationRecord
ip: request.remote_ip).session_id
end

def exclusive_session(id)
def clear_other_sessions(id)
session_activations.exclusive(id)
end



Laddar…
Avbryt
Spara