mailing list archives
[BMSA-2011-01] Insecure secure cookie in web.go
From: Nam Nguyen <namn () bluemoon com vn>
Date: Fri, 25 Feb 2011 16:27:00 +0700
BLUE MOON SECURITY ADVISORY 2011-01
:Title: Insecure secure cookie in web.go
:Reporter: Blue Moon Consulting
:Fixed in: --
web.go is the simplest way to write web applications in the Go programming language. It's ideal for writing simple,
performant backend web services.
web.go's secure cookie is modeled after Tornado. It suffers the same vulnerability that was documented in `BMSA 2010-01
This vulnerability is rated at low severity due to situational exploiting conditions.
There is no workaround.
There is no fix at the moment.
Blue Moon Consulting adapts `RFPolicy v2.0 <http://www.wiretrip.net/rfp/policy.html>`_ in notifying vendors.
:Initial vendor contact:
November 19, 2010: Notice sent to Michael Hoisie.
November 20, 2010: Michael replied confirming the bug and promising to update it.
January 12, 2011: Quick ping sent to Michael to ask for an estimated time of a fix and coordinate an announcement on
:Public disclosure: February 25, 2011
No exploit code required.
The information provided in this advisory is provided "as is" without warranty of any kind. Blue Moon Consulting Co.,
Ltd disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a
particular purpose. Your use of the information on the advisory or materials linked from the advisory is at your own
risk. Blue Moon Consulting Co., Ltd reserves the right to change or update this notice at any time.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- [BMSA-2011-01] Insecure secure cookie in web.go Nam Nguyen (Feb 25)