omniauth-oauth2
omniauth-oauth2 copied to clipboard
Prevent timing attack on CSRF
use secure_compare instead of plain equality comparison on request and callback state to prevent timing attacks.
Hey! Would you mind rebasing on master and removing all rubocop
specific updates? I'll merge this in once that's complete. Thanks!
@tmilewski Hi! Just did that, thanks!
Prefect, thank you! I’ll try and get this pushed up later today.
Thanks again! On Dec 19, 2018, 2:35 PM -0800, Margaret Ma [email protected], wrote:
@tmilewski Hi! Just did that, thanks! — You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub, or mute the thread.
Closing and reopening to trigger CI
I don't have permission to write to this fork but was wondering if it's possible to get this PR over the line (or the new PR I just opened which resolves the merge conflicts and spec rename) to fix an outstanding security vuln that's also affecting omniauth-auth0 downstream I didn't find a CONTRIBUTING.md but would love more information on contributing if it would help