Bug #4457
closedCVE-2014-0090 - Session fixation, new session IDs are not generated on login
Description
Description
Since new session id is not generated every time users log in, authentication can be bypassed through session fixation attacks in the situation where attackers are able to fixate another user's session id. Once users log in with the session id, attackers could also access the whole site with the user's privilege.
Severity: Medium
Affected URLs
http://$foreman/users/login
Steps
At host A, get a new session_id by accessing /users/login with any existing cookie removed.
At host B, access /users/login through http proxy. Intercept a request and delete Cookie header if exists. Intercept its response and
modify _session_id in Set-cookie header with the one got in host A.
At host B, access /users/login and verify if the injected _session_id is using in Cookie header.
At host B, log in with admin(or any user) account.
At Host A, verify if the session is considered as authenticated.
Result
User at host A can access the application bypassing authentication
Remedy advice
The session ID should be always changed when users log in.
Files
Updated by Dominic Cleal about 11 years ago
- Subject changed from Session fixation, new session IDs are not generated on login to CVE-2014-0090 - Session fixation, new session IDs are not generated on login
- Description updated (diff)
Updated by Joseph Magen about 11 years ago
- Status changed from New to Ready For Testing
- Assignee set to Joseph Magen
Updated by Dominic Cleal about 11 years ago
- File 0001-fixes-4457-Session-fixation-new-session-IDs-are-not-.patch added
Updated by Dominic Cleal about 11 years ago
- File deleted (
0001-fixes-4457-Session-fixation-new-session-IDs-are-not-.patch)
Updated by Dominic Cleal about 11 years ago
- Status changed from Pending to Closed
- % Done changed from 0 to 100
Updated by Lukas Zapletal almost 7 years ago
- Related to Refactor #23875: Remove login doesn't escalate privileges test added