Home / Vulnerability Database / Config files : Session fixation
Config files
Config files : Session fixation
Classification
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
CWE
Overview
Session Fixation is an attack that aims to get a valid user session. This attack exploits incorrect session management in a vulnerable web application.
For example, session data is encoded instead of being encrypted, ostensibly as a security measure. Or the application does not assign a new session ID when authenticating a user. Possible scenario of the attack consists of three stages:
- An attacker establishes legitimate connection with the web server and gets a session ID.
- This ID is injected as a parameter of URL
http://example.com/login?sessionid="qwerty"and sent to a victim. - The victim follows the link and goes through the authentication procedure, as a result of which, the session identifier known to the attacker is set. Now the attacker has access to the data of the victim, requiring authorization.
MEDIUM
DerScanner Severity Score
Do you want to fix Config files : Session fixation in your application?
See also
Config files
Config files : Text4Shell Vulnerability
Config files
Config files : Incorrect directory deletion
Config files
