Session Security
CWE-384, CWE-613, CWE-620, CWE-304, CWE-306
Real-World Attack Scenarios
Scenario 1: Session Fixation
Attacker obtains session ID: abc123def456
Sends victim URL with this SID: http://example.com/?sid=abc123def456
Victim clicks link, uses attacker's SID
Attacker uses same SID: cookie: sessionid=abc123def456
Both user and attacker have same session!
Attacker can see what victim sees, perform actions as victim# Attacker sets own session
curl http://example.com -c cookies.txt
# Receives: Set-Cookie: sessionid=abc123def456
# Attacker sends victim this link
http://example.com/?sid=abc123def456
# Victim clicks, uses attacker's session
# Victim logs in with this session
# Now attacker is logged in as victim!
# Attacker uses same sessionid
curl http://example.com/account -b "sessionid=abc123def456"
# Victim's account!Scenario 2: Insufficient Session Expiration
Scenario 3: Unverified Password Change
Scenario 4: Missing Authentication Step
Scenario 5: Insufficient Multi-Factor Authentication
Mitigation Strategies
Related CWE Entries
Last updated