Steps To Find Vulnerabilities In Play Web Framework Code Review


We must thank IT virtualization as it led us to cloud technology. Today's IT infrastructures are already running their mission critical business applications on virtual machines.

Like the physical infrastructure, virtualization is also cursed with cyber security challenges. This article talks about a typical open source virtualization solution and depicts the steps to secure its.


Vulnerabilities in play Framework

Http only cookie bypass

CVE-2015-2156

Description

A vulnerability has been found in Play's cookie handling code that could allow an attacker to bypass the?httpOnly?flag on sensitive cookies.

Impact

Any Play apps that reflect cookie values back into the body of a response are vulnerable to this. One example of when this might be a case is if using Play's CSRF support with?csrf.cookie.name?configured, such that Play stores the csrf token in a cookie rather than the default of storing it in the session.

Affected Versions

Play 2.0 - 2.3.8

Workarounds

Upgrade to netty 3.9.8. For example:

libraryDependencies += "io.netty" % "netty" % "3.9.8.Final"

Fixes

The issue has been fixed in Play 2.3.9.

CVSS metrics

Base: 4.0

AV:N/AC:H/Au:N/C:P/I:P/A:N
Temporal: 3.1
E:POC/RL:OF/RC:C
Environmental: 1.1
CDP:ND/TD:L/CR:H/IR:H/AR:ND
Environmental scores are assuming typical internet systems. Actual environmental scores for your organization may differ.
At Valency Networks, we understand your web application and perform framework specific checks mentioned above. Our expertise in this matter enables us to be very accurate in terms of our vulnerability findings.