diff options
author | Fabien Potencier <fabien.potencier@gmail.com> | 2015-11-23 11:34:41 +0100 |
---|---|---|
committer | Fabien Potencier <fabien.potencier@gmail.com> | 2015-11-23 11:34:41 +0100 |
commit | 31c5b697c06a1f254ec337c1921b9f6b25b8f32f (patch) | |
tree | 81e2b2874e38c82011088123feb623549e91be84 /Http/RememberMe/PersistentTokenBasedRememberMeServices.php | |
parent | 4e473f4aa100d293f68dae683464f23407b0058e (diff) | |
parent | 4cbe9221d4fa99fba7aa4b21254a228758cb710d (diff) | |
download | symfony-security-31c5b697c06a1f254ec337c1921b9f6b25b8f32f.zip symfony-security-31c5b697c06a1f254ec337c1921b9f6b25b8f32f.tar.gz symfony-security-31c5b697c06a1f254ec337c1921b9f6b25b8f32f.tar.bz2 |
Merge branch '2.7' into 2.8
* 2.7:
fixed tests
migrate session after remember me authentication
prevent timing attacks in digest auth listener
mitigate CSRF timing attack vulnerability
fix potential timing attack issue
Diffstat (limited to 'Http/RememberMe/PersistentTokenBasedRememberMeServices.php')
-rw-r--r-- | Http/RememberMe/PersistentTokenBasedRememberMeServices.php | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/Http/RememberMe/PersistentTokenBasedRememberMeServices.php b/Http/RememberMe/PersistentTokenBasedRememberMeServices.php index 996eca3..cf92a8c 100644 --- a/Http/RememberMe/PersistentTokenBasedRememberMeServices.php +++ b/Http/RememberMe/PersistentTokenBasedRememberMeServices.php @@ -21,6 +21,7 @@ use Symfony\Component\Security\Core\Authentication\RememberMe\PersistentToken; use Symfony\Component\Security\Core\Authentication\Token\TokenInterface; use Symfony\Component\Security\Core\Util\SecureRandomInterface; use Psr\Log\LoggerInterface; +use Symfony\Component\Security\Core\Util\StringUtils; /** * Concrete implementation of the RememberMeServicesInterface which needs @@ -93,7 +94,7 @@ class PersistentTokenBasedRememberMeServices extends AbstractRememberMeServices list($series, $tokenValue) = $cookieParts; $persistentToken = $this->tokenProvider->loadTokenBySeries($series); - if ($persistentToken->getTokenValue() !== $tokenValue) { + if (!StringUtils::equals($persistentToken->getTokenValue(), $tokenValue)) { throw new CookieTheftException('This token was already used. The account is possibly compromised.'); } |