If successful login attempts are recorded, the raw tokens are stored in the log table. If a malicious person somehow views the data in the log table, he or she can obtain a raw token, which can then be used to send a request with that user's authority.
When you (1) use the following authentiactors,
- AccessTokens (tokens
)
- JWT (jwt
)
- HmacSha256 (hmac
)
and you (2) log successful login attempts, the raw tokens are stored.
Upgrade to Shield v1.0.0-beta.8 or later.
Disable logging for successful login attempts by the configuration files.
Config\AuthToken::$recordLoginAttempt
to Auth::RECORD_LOGIN_ATTEMPT_FAILURE
or Auth::RECORD_LOGIN_ATTEMPT_NONE
Config\AuthJWT::$recordLoginAttempt
to Auth::RECORD_LOGIN_ATTEMPT_FAILURE
or Auth::RECORD_LOGIN_ATTEMPT_NONE
If you have any questions or comments about this advisory: * Open an issue or discussion in codeigniter4/shield * Email us at security@codeigniter.com
{ "nvd_published_at": "2023-11-24T18:15:07Z", "cwe_ids": [ "CWE-532" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-11-23T00:28:13Z" }