N OT E
In certain circumstances it may be possible to circumvent cookie path
restrictions, enabling a malicious web site residing at one path to access the
cookies belonging to an application at a different path. Hence, the path
attribute should not be relied upon to be completely reliable. See the following
paper by Amit Klein for more details:
www.webappsec.org/lists/websecurity/archive/2006-03/
msg00000.html
HACK STEPS
Review all of the cookies issued by the application, and check for any
domain
or
path
attributes used to control of the scope of the cookies.
■
Do'stlaringiz bilan baham: