Skip to content
This repository was archived by the owner on Dec 19, 2023. It is now read-only.

Conversation

@alromh87
Copy link

@alromh87 alromh87 commented Sep 23, 2020

📊 Metadata *

Bounty URL: https://www.huntr.dev/bounties/2-packagist-userfrosting%2Fuserfrosting

⚙️ Description *

Persistent sessions are invalidated after password change.

💻 Technical Description *

Userfost uses gbirke/rememberme for persistent sessions so cleanAllTriplets is called via logout in Authenticator class after password change.

🐛 Proof of Concept (PoC) *

  1. Setup UserFrosting and crate user
  2. Login with new user from two different browsers enabling 'Keep me signed in'
  3. Change password on one session
  4. Persistent session on the other browser will still be valid

🔥 Proof of Fix (PoF) *

After fix persistent session will be invalidated and user will have to login again.

userfrostingPWDPOF

👍 User Acceptance Testing (UAT)

Password can be changed normally

@alromh87 alromh87 changed the title Remove pesistent sessions after password change Remove persistent sessions after password change Sep 24, 2020
@ghost ghost requested a review from JamieSlome October 9, 2020 13:20
@JamieSlome JamieSlome merged commit 5c379e5 into 418sec:master Oct 9, 2020
@huntr-helper
Copy link

Congratulations alromh87 - your fix has been selected! 🎉

Thanks for being part of the community & helping secure the world's open source code.
If you have any questions, please respond in the comments section, or hit us up on Discord. Your bounty is on its way - keep hunting!

Come join us on Discord

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants