Session Fixation

Session Fixation

Overview of the Vulnerability

Session fixation occurs when there is an error in the way the application manages session IDs for users. An attacker with access to the application can set the session or cookies manually to force the targeted user’s browser to fixate on using the attacker's session cookies. This can be performed by setting a token in the URL or a hidden form by chaining vulnerabilities.

Business Impact

This vulnerability could lead to data theft through the attacker’s ability to manipulate data through their access to the application, and their ability to interact with other users, including performing other malicious attacks, which would appear to originate from a legitimate user. These malicious actions could also result in reputational damage for the business through the impact to customers’ trust.

Steps to Reproduce

  1. Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP

  2. Use a browser to navigate to: {{URL}}

  3. Sign into a user’s account

  4. Perform {{action}} to see the session token in the URL or form field and copy it:

{{screenshot}}

  1. Open another container or incognito session and set the cookie manually

  2. Observe the application does {{action}} to show that the session is fixated

Proof of Concept (PoC)

The screenshot(s) below shows the full exploit:

{{screenshot}}

Recommendation(s)

The application should implement a session token renewal once a user has successfully authenticated.

For further information, please see:

Last updated