lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 8 Mar 2003 18:34:37 +0100
From: "Mitja Kolsek" <lists@...os.si>
To: "Christoph Schnidrig" <christoph.schnidrig@...c.ch>
Subject: RE: JRun: The Easiness of Session Fixation


Hi Christoph,

I'm sure you know this but as the author of the session fixation paper I'd
like to make things perfectly clear for everyone: The JRun functionality
that you mentioned is *NOT* a security problem by itself. There has to exist
a session fixation vulnerability in a web application to be exploited using
this functionality in the first place!
You're right that it makes fixing a session much easier but it's just an
unfortunate side effect. Again, if the web application is immune to session
fixation, your ability to set a session ID cookie becomes completely
irrelevant to security. Session fixation is a vulnerability of web
applications, not the web servers these apps are running on. Apologies to
everyone for repeating myself, but my paper seems to have caused a bit of
confusion among readers.

To answer one of your questions, you can make a call to session.invalidate()
for invalidating any current session the browser may be in. This will make
JRun issue a new JSESSIONID cookie.

Regards,

Mitja Kolsek
ACROS Security
http://www.acros.si


> -----Original Message-----
> From: Christoph Schnidrig [mailto:christoph.schnidrig@...c.ch]
> Sent: Friday, February 28, 2003 3:36 PM
> To: bugtraq@...urityfocus.com
> Subject: JRun: The Easiness of Session Fixation
>
>
> Hi all
>
> The the Session-ID Fixation paper available from
> http://www.acros.si/papers/session_fixation.pdf mentions that JRun
> accepts abritrary Session-ID's and create new sessions with the proposed
> Session-ID. This means that it is possible to send the following URL
> http://foo/bar?jsessionid=foo123 and the JRun server will accept and use
> the proposed Session-ID (foo123). Furthermore the server will set a
> cookie in users browser with the proposed Session-ID! Using this
> technique, it is much easier to exploit this kind of attack and to enter
> in other's web application sessions.
>
> Is anybody aware of a vendor patch or another workaround? Is it possible
> to enforce the server to create a new Session-ID?
>
>
> Thanks a lot
>
> Christoph
>
>



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ