Session Fixation
Session Fixation
Overview of the Vulnerability
Session fixation occurs when there is an error in the way the application manages session IDs for users. An attacker with access to the application can set the session or cookies manually to force the targeted user’s browser to fixate on using the attacker's session cookies. This can be performed by setting a token in the URL or a hidden form by chaining vulnerabilities.
Business Impact
This vulnerability could lead to data theft through the attacker’s ability to manipulate data through their access to the application, and their ability to interact with other users, including performing other malicious attacks, which would appear to originate from a legitimate user. These malicious actions could also result in reputational damage for the business through the impact to customers’ trust.
Steps to Reproduce
Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
Use a browser to navigate to: {{URL}}
Sign into a user’s account
Perform {{action}} to see the session token in the URL or form field and copy it:
{{screenshot}}
Open another container or incognito session and set the cookie manually
Observe the application does {{action}} to show that the session is fixated
Proof of Concept (PoC)
The screenshot(s) below shows the full exploit:
{{screenshot}}
Recommendation(s)
The application should implement a session token renewal once a user has successfully authenticated.
For further information, please see:
Last updated