Skip to content

Latest commit

 

History

History
25 lines (18 loc) · 730 Bytes

README.md

File metadata and controls

25 lines (18 loc) · 730 Bytes

A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier.

Example #1

  1. Threat actor sniffs network traffic and gets a session identifier
  2. Threat actor uses the same session identifier to gain unauthorized access to a victim's account

Impact

Vary

Risk

  • Gain unauthorized access

Redemption

  • Identity confirmation
  • Regenerate session ids at authentication
  • Timeout and replace old session ids
  • Store ids in HTTP cookies

ID

3693c458-c1b8-439f-8f0b-c3620c1c0129

References