Skip to content

#30 Attacker which scans for Session ID in URL#72

Open
JessicaBachmann wants to merge 8 commits intohhucn:masterfrom
JessicaBachmann:session_url
Open

#30 Attacker which scans for Session ID in URL#72
JessicaBachmann wants to merge 8 commits intohhucn:masterfrom
JessicaBachmann:session_url

Conversation

@JessicaBachmann
Copy link

Testcase and Attacker that scans for the String phpsid sid and sessionid in the URL which identifies a session id.

Still a Syntax/ escaping error in Testcase.

@rliebig
Copy link
Contributor

rliebig commented Jul 7, 2014

def check_id(page):
    if "sid" in page.url:
        return true
    if "sessionid" in page.url:
        return true
    if "phpsessid" in page.url:
        return true

    return false

I don't like this approach really... Scanning for several keywords in the URL could generate results but it wouldn't uncover every possible vulnerability. How about if we scan for a URL parameter in "token format" which is present at every/several URL?

@phihag
Copy link
Member

phihag commented Jul 7, 2014

But tokens would be fine, wouldn't they? This attack targets a specific vulnerability. Tokens can be in the URL, for example as a CSRF defense, but that's totally fine and not a security problem at all.

@rliebig
Copy link
Contributor

rliebig commented Jul 7, 2014

Tokens are too general. But my point was however, that I don't like this solution. What if the session id is transported under the parameter "id_session"? I think we need a less specific approach.

@phihag
Copy link
Member

phihag commented Jul 7, 2014

Ok, so what's your idea for this approach? How should it work?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants