Skip to content

A threat actor may trick a user into using a known session identifier to log in. after logging in, the session identifier is used to gain access to the user's account

License

Notifications You must be signed in to change notification settings

qeeqbox/session-fixation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

A threat actor may trick a user into using a known session identifier to log in. after logging in, the session identifier is used to gain access to the user's account.

Example #1

  1. Threat actor visits the vulnerable website without logging in and obtains a session identifier
  2. Threat actor tricks a victim into logging into the vulnerable website using the session identifier
  3. Threat actor uses the same session identifier to gain unauthorized access to the victim's account

Impact

Vary

Risk

  • Gain unauthorized access

Redemption

  • Identity confirmation
  • Regenerate session ids at authentication
  • Timeout and replace old session ids
  • Store ids in HTTP cookies

ID

ecd7744c-83b0-406c-a58d-63d057a5570b

References

About

A threat actor may trick a user into using a known session identifier to log in. after logging in, the session identifier is used to gain access to the user's account

Topics

Resources

License

Code of conduct

Stars

Watchers

Forks

Sponsor this project