javax.faces.ViewState vulnerabilities

UI Components for JSF
Post Reply
koori
Posts: 1
Joined: 04 Aug 2016, 21:42

20 Oct 2016, 22:24

currently we are using state saving method as server in the application configuration and all the pages contains unique value on the field "javax.faces.ViewState" & Application submits a serialized object javax.faces.ViewState in a request parameter

how can we avoid vulnerabilities/CSRF attack related to object "javax.faces.ViewState"?


Primeface4.0
JSF 2.0

-<context-param>
<param-name>javax.faces.STATE_SAVING_METHOD</param-name>
<param-value>server</param-value>
</context-param>

<context-param>
<param-name>org.apache.myfaces.USE_ENCRYPTION</param-name>
<param-value>true</param-value>
</context-param>

kukeltje
Expert Member
Posts: 9605
Joined: 17 Jun 2010, 13:34
Location: Netherlands

21 Oct 2016, 13:39

Check stackoverflow... This is not a PrimeFaces issue


smokeybandit
Posts: 277
Joined: 08 Jul 2013, 17:53

25 Oct 2016, 14:15

kukeltje wrote:Check stackoverflow... This is not a PrimeFaces issue
And by default, ViewState is encrypted anyway.

kukeltje
Expert Member
Posts: 9605
Joined: 17 Jun 2010, 13:34
Location: Netherlands

25 Oct 2016, 18:12

But in pre 2.2 is was not 100% good ;-)

https://java.net/jira/browse/JAVASERVER ... PUBLIC-869

smokeybandit
Posts: 277
Joined: 08 Jul 2013, 17:53

25 Oct 2016, 18:20

kukeltje wrote:But in pre 2.2 is was not 100% good ;-)

https://java.net/jira/browse/JAVASERVER ... PUBLIC-869
But still a lot better than pre-2.0!

kukeltje
Expert Member
Posts: 9605
Joined: 17 Jun 2010, 13:34
Location: Netherlands

25 Oct 2016, 20:07

smokeybandit wrote:
kukeltje wrote:But in pre 2.2 is was not 100% good ;-)

https://java.net/jira/browse/JAVASERVER ... PUBLIC-869
But still a lot better than pre-2.0!
+1

Post Reply

Return to “PrimeFaces”

  • Information
  • Who is online

    Users browsing this forum: No registered users and 55 guests