Play Framework Security Advisory

Session Hijack

Date

30 Dec 2015

Description

A vulnerability has been found in Play 1’s session handling.

It is possible by a 3rd-party to acquire session information for another in-progress request.

Impact

Any application that uses the session in the processing of a 500 error page is vulnerable to attack.

Affected Versions

Workarounds

Do not use the session when generating a 500 error page.

Fixes

Upgrade to the appropriate version below:

Acknowledgements

Credit for finding this vulnerability goes to Codeborne.