Описание
Turbo Frame responses can restore stale session cookies
Summary
A race condition in Turbo Frames allows delayed HTTP responses to restore stale session cookies after session-modifying operations.
Details
Browsers automatically process Set-Cookie headers from HTTP responses. When a Turbo Frame request is in-flight during a session-modifying action (such as logout), the delayed response may include a Set-Cookie header reflecting the session state at request time. This can result in stale session cookies being restored after the session was intentionally modified or invalidated.
This condition can occur naturally on slow networks. An active network attacker capable of delaying responses could potentially exploit this to restore previous session state.
Impact
Applications using Turbo Frames with cookie-based session storage may experience:
- Session state reversion after logout
- Unintended restoration of previous authentication state
The impact is limited to applications using client-side cookie storage for sessions. Applications using server-side session stores (Redis, database, etc.) are not meaningfully affected, as the server-side session state remains authoritative.
Patches
Upgrade to Turbo 8.0.21 or later. The fix cancels in-flight Turbo Frame requests when:
- The frame element is disconnected from the DOM
- The frame's disabled attribute is set
- The frame's src attribute is cleared
Workarounds
- Use server-side session storage instead of a cookie store like Rails's cookie store
- Ensure logout flows remove or disable Turbo Frame elements before invalidating sessions
References
Ссылки
- https://github.com/hotwired/turbo/security/advisories/GHSA-qppm-g56g-fpvp
- https://nvd.nist.gov/vuln/detail/CVE-2025-66803
- https://github.com/hotwired/turbo/pull/1399
- https://github.com/hotwired/turbo/commit/899df356e9f4b3303cca217cd14b3f846edda10d
- https://github.com/hotwired/turbo/releases/tag/v8.0.21
- https://turbo.hotwired.dev/handbook/frames
Пакеты
@hotwired/turbo
<= 8.0.20
8.0.21
Связанные уязвимости
Race condition in the turbo-frame element handler in Hotwired Turbo before 8.0.x causes logout operations to fail when delayed frame responses reapply session cookies after logout. This can be exploited by remote attackers via selective network delays (e.g. delaying requests based on sequence or timing) or by physically proximate attackers when the race condition occurs naturally on shared computers.