Skip to content

Latest commit

 

History

History
51 lines (40 loc) · 2.36 KB

day17.md

File metadata and controls

51 lines (40 loc) · 2.36 KB

Session Puzzling Attack

Also known as Session Variable Overloading Attack.
An app-level issue that may allow an attacker to bypass authentication, elevate privileges, skip MFA, or exploit any related issues.

Index Section
1 About the attack
2 Scenario
3 How to test
4 Practice
5 How to test

About the attack

- When an application utilizes the same session variable for multiple purposes, this can be abused by an attacker to trick the application and perform the action as an authenticated or privileged user.
- In Simple Words, For example, if the application generates a session identifier at an unauthenticated page and later that can be used to access the authenticated page, it is a session puzzling vulnerability.

Scenario

- An attacker navigates to the /forget_pass page of the application.
- He provides the username of the victim user and initiate a password reset request and observes the application assigns a session identifier by looking at the cookies.
- Now, the attacker utilizes the same session identifier in cookies to access an authenticated page /my_profile and the page is accessed successfully with the victim user's information.
- This is Session Puzzling/Session Variable Overloading Attack.

How to Test

- Always check for the session identifier generation at various unauthenticated or lower privileged pages and see if they can be used to access authenticated or higher privileged pages.

Remediation

- Session variables should only be used for a single consistent purpose.

Practice

References