What happened with the session fixation bug?

James A. Donald jamesd at echeque.com
Sat Jun 4 09:08:45 PDT 2005


    --
James A. Donald wrote:
> > The way to beat session fixation is to issue a 
> > privileged and impossible to predict session ID in 
> > response to a correct login.
> >
> > If, however, you grant privileges to a session ID on 
> > the basis of a successful login, which is in fact 
> > the usual practice, you are hosed. The normal 
> > programming model creates a session ID, then sets 
> > variables and flags associated with that session ID 
> > in response to forms submitted by the user.  To 
> > prevent session fixation, you must create the 
> > session ID with unchangeable privileges from the 
> > moment of creation.

Ben Laurie wrote:
> How does your attack work?

Your business about MACS and stuff was to prevent the 
adversary guessing the users session ID.  With "session 
fixation", the adversary does not try to guess the 
legitimate users session ID, instead he fools the 
browser of the legitimate user into using the 
adversary's session ID.

Adversary accesses web site as if about to log in, gets
a session ID.  Then supplies false information to 
someone else's browser, causes that browser on some one 
else's computer to use that session ID.  Someone else 
logs in with hacker's session ID, and now the adversary
is logged in. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     fUQA7VMYJROi7AAUHD8ZmEHReDprBvrg3u3cL2VI
     4NzEz9SAfaOzb7GhsAkM//vmMQKDsrdLEInHLumm3


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com





More information about the cypherpunks-legacy mailing list