We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OWASP recommends session tokens should be 128 bit. Parse sessions are currently 32 bit:
parse-server/src/cryptoUtils.js
Line 43 in de79b70
https://owasp.org/www-community/vulnerabilities/Insufficient_Session-ID_Length
No reproduction needed, code attached.
Session token to be a minimum of 128 bits, or be of configurable length for flexibility.
Session tokens are 32 bit.
Server
Database
The text was updated successfully, but these errors were encountered:
The current session token has 32 HEX characters, that's 128 bit entropy, so we should be good.
Sorry, something went wrong.
Derp thank you.
No branches or pull requests
Issue Description
OWASP recommends session tokens should be 128 bit. Parse sessions are currently 32 bit:
parse-server/src/cryptoUtils.js
Line 43 in de79b70
https://owasp.org/www-community/vulnerabilities/Insufficient_Session-ID_Length
Steps to reproduce
No reproduction needed, code attached.
Expected Results
Session token to be a minimum of 128 bits, or be of configurable length for flexibility.
Actual Outcome
Session tokens are 32 bit.
Environment Setup
Server
Database
The text was updated successfully, but these errors were encountered: