summaryrefslogtreecommitdiffstats
path: root/Http/RememberMe/PersistentTokenBasedRememberMeServices.php
diff options
context:
space:
mode:
authorFabien Potencier <fabien.potencier@gmail.com>2015-11-23 11:34:41 +0100
committerFabien Potencier <fabien.potencier@gmail.com>2015-11-23 11:34:41 +0100
commit31c5b697c06a1f254ec337c1921b9f6b25b8f32f (patch)
tree81e2b2874e38c82011088123feb623549e91be84 /Http/RememberMe/PersistentTokenBasedRememberMeServices.php
parent4e473f4aa100d293f68dae683464f23407b0058e (diff)
parent4cbe9221d4fa99fba7aa4b21254a228758cb710d (diff)
downloadsymfony-security-31c5b697c06a1f254ec337c1921b9f6b25b8f32f.zip
symfony-security-31c5b697c06a1f254ec337c1921b9f6b25b8f32f.tar.gz
symfony-security-31c5b697c06a1f254ec337c1921b9f6b25b8f32f.tar.bz2
Merge branch '2.7' into 2.8
* 2.7: fixed tests migrate session after remember me authentication prevent timing attacks in digest auth listener mitigate CSRF timing attack vulnerability fix potential timing attack issue
Diffstat (limited to 'Http/RememberMe/PersistentTokenBasedRememberMeServices.php')
-rw-r--r--Http/RememberMe/PersistentTokenBasedRememberMeServices.php3
1 files changed, 2 insertions, 1 deletions
diff --git a/Http/RememberMe/PersistentTokenBasedRememberMeServices.php b/Http/RememberMe/PersistentTokenBasedRememberMeServices.php
index 996eca3..cf92a8c 100644
--- a/Http/RememberMe/PersistentTokenBasedRememberMeServices.php
+++ b/Http/RememberMe/PersistentTokenBasedRememberMeServices.php
@@ -21,6 +21,7 @@ use Symfony\Component\Security\Core\Authentication\RememberMe\PersistentToken;
use Symfony\Component\Security\Core\Authentication\Token\TokenInterface;
use Symfony\Component\Security\Core\Util\SecureRandomInterface;
use Psr\Log\LoggerInterface;
+use Symfony\Component\Security\Core\Util\StringUtils;
/**
* Concrete implementation of the RememberMeServicesInterface which needs
@@ -93,7 +94,7 @@ class PersistentTokenBasedRememberMeServices extends AbstractRememberMeServices
list($series, $tokenValue) = $cookieParts;
$persistentToken = $this->tokenProvider->loadTokenBySeries($series);
- if ($persistentToken->getTokenValue() !== $tokenValue) {
+ if (!StringUtils::equals($persistentToken->getTokenValue(), $tokenValue)) {
throw new CookieTheftException('This token was already used. The account is possibly compromised.');
}