WebApp Sec mailing list archives
Re: Browser refresh sends username/password after log out -- URGENT
From: Chris Scott <cgscott () ll mit edu>
Date: Wed, 06 Aug 2003 10:26:11 -0400
Possibly due to the use of frames. The result of the POST for the login form could be a frameset, and pages 2 thru 7 are displayed in a frame. So the reload tries to refresh the page containing the frameset, which resulted from the login POST.
Chris Tim Aranki wrote:
The fact that a refresh on the 7th page is sending the form vars from the login sounds to me like something else is happening: 1. Refresh on 7th page 2. App determins that user is not logged in and redirects to login page 3. Browser tries to be smart, and on the redirect sends its cached form vars for the login page Do you see any redirect headers in the net traffic? Unless you are writing the login form fields to every page, I do not see how/why the browser would resend those specific field vars...why would it not send all field vars from the last 6 pages then? My guess is a redirect, and a browser that is trying to be too smart. Hth, -tim -----Original Message-----From: Krk [mailto:krk41 () yahoo com] Sent: Tuesday, August 05, 2003 11:59 PMTo: Ingo Struck Cc: webappsec () securityfocus com Subject: RE: Browser refresh sends username/password after log out -- URGENT Hi Ingo ...thanks for the reply.More clearly the issue here is also that: 1.) We login using username/password 2.) Suppose we have browsed 7 pages after log in and then we say logout and we get logout message so after logging in this is the 8th page. 3.) Now after this we just do 1 back, so effectively we should bein the 7th page that we had browsed. 4.) Now we do a refresh( this is again on the 7th page and not on the login page) and the same request that we had sent in the login form is being resent. This is what i am wondering that how come the refresh sends the form fields that were entered in the Login Form and not the "Logout" request whichwe had sent from the 7th page. 5)hope I am making the question clear.thnaks Krk --- Ingo Struck <ingo () ingostruck de> wrote:Hi... See my comments inline. > 1) - 5) I guess anybody in this lists knows that... ;o) > 6) Can anyone explain this behaviour and how to > avoid the resubmission of the credentials. What you see here is a "feature" of most today's browsers. The reason for that is the idea of a history: you should be able to move back and forth in the browsers history and see exactly the "content" that you saw before. For GET reqs this is not a problem, because all necessary parameters are encoded in the URL. For POST, however, it is necessary to memorize the posted parameters to be able to reconstruct the result of a former request. So it is indeed an exact copy of the former request that is issued if you click ok in the confirmation dialog. This dialog exists exactly because it may be unwanted to "replay" that former request. > 7) How many requests does the browser window store > in its temporary cache. I haven't heard of any browser with full-automatic persistent storage of submitted form data. If you close your browser, all POSTed parameters are lost. However, most modern browsers, provide a facility to store form data permanently. Some of them seem to set that as a default, but all of them that I know ask before they store form data and allow to switch off that thing completely. Your problem is only an issue for "shared" browsers, i.e. machines where the browser is shared by multiple users (e.g. icafes, highschool, library etc.) The solution for your problem is two-way: 1) inform your users that it is a *VERY HIGH RISK* to use public browsers for banking anyway and advise them *NOT TO DO THAT* 2) use a technical work around for the problem. There are two main approaches, where the first is more common and the second is more secure. Work-Around I) (not recommended, using pop-up windows to break the browser's history) You may work around the problem if you place the login dialog in a pop-up window, since that breaks the browser's history. I know many libraries doing that for their online-accounts. The mechanism is like that: a) for the login, pop up a new browser window b) after login finished close that new window To be perfectly sure that nothing went wrong, you should break the browser's history during logout too: c) for logoff, pop up a new browser window d) close *all* other open browser window An alternative is to run the complete application within a new pop-up window, that is then closed upon logoff. That breaks browser's history too effectively. Of course, popping up a window is an absolute NO-GOs regarding usability, but it may be necessary as a security work-around. The main drawback of this solution is, that you need to enable scripting, which by itself is a security problem. Work-Around II) (recommended, works with transaction tokens) Add a per-request token for each submitted form. The mechanism is like that: a) for each new session generate a random number in the lower half of the number range (e.g. 0 up to 1/2 MAX_INT), store that number in the session, it is your CURRENT TRANSACTION c) for each response that leads to a form using POST, encrypt the CURRENT TRANSACTION and send it as a hidden field within the form that needs input, this is your TRANSACTION TOKEN e) for each request that contains a TRANSACTION TOKEN, decrypt that token, parse it to a number and compare the result to the CURRENT TRANSACTION. If they are both equal, then you received a correct transaction so you i) increase the CURRENT TRANSACTION in the session (this is vital!) ii) process the request Else the transaction is illegal and you can ignore the request. You could create completely random transaction tokens as well (saves the effort of encrypting the numbers), but then you run into the probability that you replicate some old transaction, if you RNG is poor. Hope that helped and kind regards Ingo Struck===== " DON'T WORRY BE HAPPY, EVERY NIGHT YOU HAVE SOME TROUBLE, IF YOU WORRY YOU MAKE IT DOUBLE, SO DON'T WORRY BE HAPPY NOW...." __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Current thread:
- Re: Browser refresh sends username/password after log out -- URGENT, (continued)
- Re: Browser refresh sends username/password after log out -- URGENT Alex 'CAVE' Cernat (Aug 05)
- RE: Browser refresh sends username/password after log out -- URGENT Tiago Halm (Aug 05)
- Re: Browser refresh sends username/password after log out -- URGENT Imre Kertesz (Aug 05)
- Re: Browser refresh sends username/password after log out -- URGENT Spicciati Jaime (Aug 05)
- Re: Browser refresh sends username/password after log out -- URGENT Phillip Schroeder (Aug 05)
- Re: Browser refresh sends username/password after log out -- URGENT najeeb . hatami (Aug 05)
- RE: Browser refresh sends username/password after log out -- URGENT Ingo Struck (Aug 05)
- RE: Browser refresh sends username/password after log out -- URGENT Krk (Aug 06)
- Re: Browser refresh sends username/password after log out -- URGENT Ingo Struck (Aug 06)
- RE: Browser refresh sends username/password after log out -- URGENT Tim Aranki (Aug 06)
- Re: Browser refresh sends username/password after log out -- URGENT Chris Scott (Aug 06)
- RE: Browser refresh sends username/password after log out -- URGENT roshen.chandran (Aug 07)
- RE: Browser refresh sends username/password after log out -- URGENT Krk (Aug 06)
- Re: Browser refresh sends username/password after log out -- URGENT Jim McGarvey (Aug 06)