-
Notifications
You must be signed in to change notification settings - Fork 189
Added documentation on how to mitigate CVE-2015-9284. #175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for taking care of this! ❤️
Co-authored-by: Tobias Kraze <[email protected]>
…ks to @n00dle. Co-authored-by: n00dle <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There's a few things that I want to touch up on this documentation, but I don't think it's worth blocking the PR for it. I think I can work on them on a follow-up commit.
Overall, I think this looks good for me.
@@ -109,7 +109,30 @@ MyLogger.send :include, ActiveRecord::SessionStore::Extension::LoggerSilencer | |||
This silencer is being used to silence the logger and not leaking private | |||
information into the log, and it is required for security reason. | |||
|
|||
## Contributing to Active Record Session Store | |||
CVE-2015-9284 mitigation |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@thorsteneckel was this just a mistake or does CVE-2015-9284 have any connection to CVE-2019-25025 ?
As requested by @sikachu in #151 I added a block to the README on how to mitigate CVE-2015-9284 by converting insecurely stored session IDs by running an Active Record Migration including an example and remark for custom Session classes.
cc @rafaelfranca