Vulnerabilities in play Framework
Http only cookie bypass
A vulnerability has been found in Play’s cookie handling code that could allow an attacker to bypass the httpOnly flag on sensitive cookies.
Any Play apps that reflect cookie values back into the body of a response are vulnerable to this. One example of when this might be a case is if using Play’s CSRF support with csrf.cookie.name configured, such that Play stores the csrf token in a cookie rather than the default of storing it in the session.
Play 2.0 – 2.3.8
Upgrade to netty 3.9.8. For example:
libraryDependencies += “io.netty” % “netty” % “3.9.8.Final”
The issue has been fixed in Play 2.3.9.
Environmental scores are assuming typical internet systems. Actual environmental scores for your organization may differ.
At Valency Networks, we understand your web application and perform framework specific checks mentioned above. Our expertise in this matter enables us to be very accurate in terms of our vulnerability findings.