-
Notifications
You must be signed in to change notification settings - Fork 324
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Malicious user can access one server forever by forging cookie #107
Comments
@onestraw there is an issue indeed, but I don't agree with:
The fact that the server IP is visible in the cookie is the issue, as we shouldn't be able to see this info. But even if a hash were used instead of the ip, a user could forge a request to access this specific server, indeed, this is the whole point of sticky session right? But in this case, he couldn't guess other servers' IP. |
Yes, we shouldn't disclose backend server to client. And we should also avoid giving client possibility to select backend server. Cookie is used to map the backend server, simple hash can not solve the problem, LB should has some checking method, check some unique data for each client. If we hash the combination of client address (ip:port, http.Request.RemoteAddr) and backend server (after LB select), the hash value is used as cookie. Client A access the server, GW generates the cookie related the user's address, which is unique. The second time A access the server, GW lookup the map table or try to combine A's address with each server and compare the hash value, ... Client B cannot use A's Cookie as they have different address. |
@onestraw I really don't get the issue here. IP is not something we can trust (multiple users can be behind a proxy and have the same IP). Do you have any example of those checks being done on other projects ? |
@emilevauge Yes, we cannot trust client IP, it's just increase the difficult to control of accessing backend server. Currently I don't have verified it, but I will work more on this, and give updates. |
@onestraw to be clear, I think it would be a mistake to introduce this check. You should not lose your cookie (and be disconnected) when your IP changes. |
@emilevauge You're right. |
Malicious user can access the specific server forever by setting backend server in cookie, it's very dangerous if the project is used in API gateway.
I will show how to reproduce the issue:
gateway code
exploit
curl -i http://127.0.0.1:8000
curl -H "Cookie: zzz=http://127.0.0.1:8001; Path=/" http://127.0.0.1:8000
even without Path
curl -H "Cookie: zzz=http://127.0.0.1:8001" http://127.0.0.1:8000
Do you think we should enhance it?
The text was updated successfully, but these errors were encountered: