Skip to content

Commit e9fed90

Browse files
tmandkestevenharman
authored andcommitted
Make fetching insecure session fallback configurable
This change allows the disabling of fallback used to access old, insecure sessions, and rewrite them as secure sessions. The fallback was originally added as part of the mitigation of CVE-2019-25025 several years back. However, this fallback mechanism was added over 5 years ago. In many cases, or at least in our case, the expiry on old, insecure, sessions has long since passed. We'd like the ability to disable the fallback entirely as it will never be a valid path for us. see: #151
1 parent d517758 commit e9fed90

File tree

3 files changed

+37
-1
lines changed

3 files changed

+37
-1
lines changed

README.md

+7
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,13 @@ been updated in the last 30 days. The 30 days cutoff can be changed using the
3838
Configuration
3939
--------------
4040

41+
Disable fallback to use insecure session by providing the option
42+
`secure_session_only` when setting up the session store.
43+
44+
```ruby
45+
Rails.application.config.session_store :active_record_store, key: '_my_app_session', secure_session_only: true
46+
```
47+
4148
The default assumes a `sessions` table with columns:
4249

4350
* `id` (numeric primary key),

lib/action_dispatch/session/active_record_store.rb

+6-1
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,11 @@ class ActiveRecordStore < ActionDispatch::Session::AbstractSecureStore
6060
SESSION_RECORD_KEY = 'rack.session.record'
6161
ENV_SESSION_OPTIONS_KEY = Rack::RACK_SESSION_OPTIONS
6262

63+
def initialize(app, options = {})
64+
@secure_session_only = options.delete(:secure_session_only) { false }
65+
super(app, options)
66+
end
67+
6368
private
6469
def get_session(request, sid)
6570
logger.silence do
@@ -136,7 +141,7 @@ def get_session_with_fallback(sid)
136141
if sid && !self.class.private_session_id?(sid.public_id)
137142
if (secure_session = session_class.find_by_session_id(sid.private_id))
138143
secure_session
139-
elsif (insecure_session = session_class.find_by_session_id(sid.public_id))
144+
elsif !@secure_session_only && (insecure_session = session_class.find_by_session_id(sid.public_id))
140145
insecure_session.session_id = sid.private_id # this causes the session to be secured
141146
insecure_session
142147
end

test/action_controller_test.rb

+24
Original file line numberDiff line numberDiff line change
@@ -305,6 +305,30 @@ def test_session_store_with_all_domains
305305
end
306306
end
307307

308+
define_method :"test_unsecured_sessions_are_ignored_when_insecure_fallback_is_disabled_#{class_name}" do
309+
with_store(class_name) do
310+
session_options(secure_session_only: true)
311+
with_test_route_set do
312+
get '/set_session_value', params: { foo: 'baz' }
313+
assert_response :success
314+
public_session_id = cookies['_session_id']
315+
316+
session = ActiveRecord::SessionStore::Session.last
317+
session.data # otherwise we cannot save
318+
session.session_id = public_session_id
319+
session.save!
320+
321+
get '/get_session_value'
322+
assert_response :success
323+
324+
session.reload
325+
new_session = ActiveRecord::SessionStore::Session.last
326+
assert_not_equal public_session_id, new_session.session_id
327+
assert_not_equal session.session_id, new_session.session_id
328+
end
329+
end
330+
end
331+
308332
# to avoid a different kind of timing attack
309333
define_method :"test_sessions_cannot_be_retrieved_by_their_private_session_id_for_#{class_name}" do
310334
with_store(class_name) do

0 commit comments

Comments
 (0)