⭐️

Vulnerabilities in play Framework

one of the best cyber security vapt companies

Table of Contents

Vulnerabilities in play Framework

Http only cookie bypass
CVE-2015-2156
Description
A vulnerability has been found in Play’s cookie handling code that could allow an attacker to bypass the httpOnly flag on sensitive cookies.
Impact
Any Play apps that reflect cookie values back into the body of a response are vulnerable to this. One example of when this might be a case is if using Play’s CSRF support with csrf.cookie.name configured, such that Play stores the csrf token in a cookie rather than the default of storing it in the session.
Affected Versions
Play 2.0 – 2.3.8
Workarounds
Upgrade to netty 3.9.8. For example:
libraryDependencies += “io.netty” % “netty” % “3.9.8.Final”
Fixes
The issue has been fixed in Play 2.3.9.
CVSS metrics
Base: 4.0
AV:N/AC:H/Au:N/C:P/I:P/A:N
Temporal: 3.1
E:POC/RL:OF/RC:C
Environmental: 1.1
CDP:ND/TD:L/CR:H/IR:H/AR:ND
Environmental scores are assuming typical internet systems. Actual environmental scores for your organization may differ.
At Valency Networks, we understand your web application and perform framework specific checks mentioned above. Our expertise in this matter enables us to be very accurate in terms of our vulnerability findings.

Prashant Phatak

Founder & CEO, Valency Networks

Prashant Phatak is an accomplished leader in the field of IT and Cyber Security. He is Founder and C-level executive of his own firm Valency Networks. Prashant specializes in Vulnerability assessment and penetration testing (VAPT) of Web, Networks, Mobile Apps, Cloud apps, IoT and OT networks. He is also a certified lead auditor for ISO27001 and ISO22301 compliance.As an proven problem solver, Prashant's expertise is in the field of end to end IT and Cyber security consultancy to various industry sectors.

Related Blogs

Difference Between Privilege Escalation Attack and IDOR Attack

⭐️

Wireshark Tutorial -10 | Creating Wireshark Profiles

⭐️

Wireshark Tutorial -9 | Exporting and Sharing PCAP Files

⭐️

Wireshark Tutorial -8 | Detecting ICMP Floods or DoS Attempts

⭐️

Wireshark Tutorial -7 | Expose passwords sent in plain text

⭐️

Wireshark Tutorial -6 | Analyze HTTP, HTTPS, and DNS traffic