Description
Issue in detail:
Let's say a signed cookie is created with ['abc']
secret using cookie-parser
module and save on the browser's cookie storage. Later on, due to the reason of cookie secret compromise, the user needs to change the cookie secret for e.g., ['xyz']
on the express server.
Now, the server is re-started with the updated cookie secret ['xyz']
and the user tries to fire an HTTP request method via browser on the same domain on another API endpoint of the server. As the signed cookie created with ['abc']
secret already exists on the browser's cookie storage (Assume the cookie is not expired), the same signed cookie is included by the browser under the req
object and express server receives the same under req.headers.cookie
.
In this case, as the cookie secret is updated, the cookie-parser
module's middleware function will not be able to parse that signed cookie. I have gone through signedCookies(obj, secret){}
function defined under the same module and found that in this particular case, the function is populating req.signedCookies
object with key cookieName
and value false
.
Since that signed cookie is unable to parse with the updated secret, the signedCookies(obj, secret){}
function should not include this scenario-type signed cookies under req.signedCookies
object as they become invalid post cookie secret updation.
The bug is reproducible by the below steps included with screenshots:
- Initialize
cookieParser()
with secret'abc'
using
const cookieParser = require('cookie-parser');
const express = require('express');
const app = express();
app.use(cookieParser('abc'));
- Create a signed cookie and return the response using
return res.cookie('csrf', 'csrfToken', { expires: new Date(Date.now() + 30 * 60 * 1000), httpOnly: true, signed: true });
- Update and save new cookie secret
'xyz'
using
app.use(cookieParser('xyz'));
- Restart the express server.
- Use browser to send HTTP request on the same server's domain on another API endpoint of the server.
- The server gets the browser request and the request goes through
cookieParser(req, res, next)
middleware ofcookie-parser
module. - Execution flow comes under the module function
signedCookies (obj, secret){}
, this function does not handle possible values ofvar dec
forundefined
andfalse
returned bysignedCookie(val, secret){}
function.
- In this context,
false
value is returned bysignedCookie(val, secret){}
function ascookie-signature
module is unable to unsign that signed cookie with the updated secret and thus returnsfalse
. As the validation forundefined
andfalse
values are not implemented, thereq.signedCookies
object is populated with that signed cookie consequently having cookie name ascsrf
and cookie value asfalse
.
Fixing the bug:
Handle the validation of afore-mentioned undefined
and false
values in such a way that all signed cookies possessing the scenario described above can be ignored and should neither be included in req.cookies
nor in req.signedCookies
objects as they become invalid post cookie secret updation.
I have already worked to fix this bug and will soon create a pull request tagging this issue no. as reference.
@dougwilson Kindly check on my careful observations and provide your meaning inputs on the same. If my work looks correct and appreciable, please merge my pull request which I will be creating after posting this issue.