https://bz.apache.org/bugzilla/show_bug.cgi?id=69839

            Bug ID: 69839
           Summary: Changing SessionId creates eternal Single Sign On
                    sessions
           Product: Tomcat 9
           Version: unspecified
          Hardware: All
                OS: All
            Status: NEW
          Severity: major
          Priority: P2
         Component: Catalina
          Assignee: [email protected]
          Reporter: [email protected]
  Target Milestone: -----

Created attachment 40111
  --> https://bz.apache.org/bugzilla/attachment.cgi?id=40111&action=edit
Fix and test

The SingleSignon functionality is not aware of changing sessionIds. This means
that any sessionId change after session association will cause the SSO to live
for forever.
The SSO entry is supposed to expire upon expiration of the last context
session, this is handled by SingleSignOnListener via the destroySession event.
Unfortunately SingleSignOnSessionKey is used to identify the expired session,
and the SingleSignOnSessionKey.sessionId is immutable. So the destroySession
event will not have any effect.

The problem is present in 9.x to 11.x

I have attached a patch that adds a changeSessionId event, so that
SingleSignOnListener may perform the required updates.

The test case is borrowing code from the other SSO tests.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to