Words of Wisdom:

"It's not how smart you are, but how hard you try" - Teacher

Session Fixation

  • Date Submitted: 04/05/2010 07:27 PM
  • Flesch-Kincaid Score: 53.1 
  • Words: 5773
  • Essay Grade: no grades
  • Report this Essay
PUBLIC
Session Fixation Vulnerability in Web-based Applications

Session Fixation Vulnerability in Web-based Applications
Version 1.0 – revision 1 Mitja Kolšek ACROS Security December 2002 (Revised February 2007 – the Acknowledgments section) Current copy available at http://www.acrossecurity.com/papers/session_fixation.pdf mitja.kolsek@acrossecurity.com http://www.acrossecurity.com

1. Abstract
Many web-based applications employ some kind of session management to create a user-friendly environment. Sessions are stored on server and associated with respective users by session identifiers (IDs). Naturally, session IDs present an attractive target for attackers, who, by obtaining them, effectively hijack users’ identities. Knowing that, web servers are employing techniques for protecting session IDs from three classes of attacks: interception, prediction and brute-force attacks. This paper reveals a fourth class of attacks against session IDs: session fixation attacks. In a session fixation attack, the attacker fixes the user’s session ID before the user even logs into the target server, thereby eliminating the need to obtain the user’s session ID afterwards. There are many ways for the attacker to perform a session fixation attack, depending on the session ID transport mechanism (URL arguments, hidden form fields, cookies) and the vulnerabilities available in the target system or its immediate environment. The paper provides detailed information about exploiting vulnerable systems as well as recommendations for protecting them against session fixation attacks.

2. Introduction
Web-based applications frequently use sessions to provide a friendly environment to their users. HTTP [1] is a stateless protocol, which means that it provides no integrated way for a web server to maintain states throughout user’s subsequent requests. In order to overcome this problem, web servers – or sometimes web applications – implement various kinds of session management. The...

Comments

Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments