This flaw allow attackers to compromise passwords, keys, or session tokens/IDs to assume other users' identities.
- Attack on user ID & Password if it is not encrypted in transit or at rest.
- If session IDs are exposed in URL, it can be stolen.
- Session hijacking & session fixation are possible.
- Session ID can be guessed if it is not unique & random.
- Session ID must be changed after authentication and should be handled properly.
- Attack on Confidentiality
- Attack on Integrity
- Attack on Availability
Exploitability : Average
Impact : Severe
- Use strong encryption algorithm to encrypt data in transit or at rest.
- Do not give Session ID in URL.
- Change Session ID after login and frequently thereafter.
- Give unique & random session ID.
- Make strong efforts to avoid XSS flaws which can be used to steal session IDs.
No comments:
Post a Comment