[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CANrsu0gcZp_mtfNRK-8QFoZpQx8u9ExWz8H8jH349KEw-j1A0A@mail.gmail.com>
Date: Thu, 27 Oct 2011 17:57:34 +0530
From: information security <informationhacker08@...il.com>
To: Darren McDonald <athena@...donald.net>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>,
William Reyor <opticfiber@...il.com>
Subject: Re: Microsoft Outlook Web Access Session
sidejacking/Session Replay Vulnerability
so this is will be considered as vulnerability or not ?
because Successful exploits may allow attackers to hijack web sessions or
bypass authentication through a replay attack and gain access to a victim's
email account.
Asheesh
On Wed, Oct 26, 2011 at 5:55 AM, Darren McDonald <athena@...donald.net>wrote:
> I think you'll find that it was my point as well :) Sidejacking isnt a
> vulnerability. It's the end result after an actual vulnerability has
> been exploited. I.e. crappy session management, not setting the secure
> flag, poor use of HTTPS, SSLv2/cipher reuse+weak ciphers+crap browser,
> or whatever moronic thing the developer did to allow the session token
> to go over the network in the clear in the first place.
>
> Apparently sarcasm is a lost art form.
>
> Renski
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists