Page MenuHome GnuPG

roundup_session_gCodesBTS cookie on bugs.g10code.com should set the secure flag
Closed, ResolvedPublic

Description

Currently, the session cookie associated with a login on this issue tracker does
not have the secure flag set. This means that anyone controlling an upstream
router can potentially sniff the cookie (and thereby hijack the browser's
session) by tricking the user into sending a cleartext HTTP request to
bugs.g10code.com. This would be as simple as injecting a hidden "img" tag into
an unrelated cleartext HTTP request (e.g. a typical web search).

Event Timeline

Well, this is a bug in roundup. It would be useful to report that upstream.

OTOH, I don't consider this a problem requring immediate action. We use https
and accounts mainly to avoid spam and trolls.

werner claimed this task.
werner added a project: Won't Fix.