The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 12  ■ Attacking Other Users



Download 5,76 Mb.
Pdf ko'rish
bet772/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   768   769   770   771   772   773   774   775   ...   875
Bog'liq
3794 1008 4334

Chapter 12 



Attacking Other Users



451

70779c12.qxd:WileyRed  9/14/07  3:14 PM  Page 451




browser. In the case of cookies, this attack will succeed in hijacking the

user’s session even against applications that issue 

HttpOnly

cookies,


and so where cookies cannot be straightforwardly captured via an XSS

attack.


In both of these cases, the same various mechanisms for delivering the

attack are available as were described previously for reflected XSS.

Session fixation vulnerabilities can also exist in applications that do not con-

tain login functionality. For example, an application may allow anonymous

users to browse a catalog of products, place items into a shopping cart, check

out by submitting personal data and payment details, and then review all of

this information on a Confirm Order page. In this situation, an attacker may fix

an anonymous session token with the browser of a victim, wait for that user to

place an order and submit sensitive information, and then access the Confirm

Order page using the token, to capture the user’s details.

Some web applications and web servers accept arbitrary tokens submitted

by users, even if these were not previously issued by the server itself. When an

unrecognized token is received, the server simply creates a new session for the

token, and handles it exactly as if it were a new token generated by the server.

Microsoft IIS and Allaire ColdFusion servers have been vulnerable to this

weakness in the past.

When an application or server behaves in this way, attacks based on session

fixation are made considerably easier because the attacker does not need to

take any steps to ensure that the tokens fixed in target users’ browsers are cur-

rently valid. The attacker can simply choose an arbitrary token, distribute this

as widely as possible (for example, by emailing a URL containing the token to

individual users, mailing lists, etc.), and then periodically poll a protected

page within the application (for example, My Details) to detect when a victim

has used the token to log in. Even if a targeted user does not follow the URL

for several months, a determined attacker may still be able hijack their session.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   768   769   770   771   772   773   774   775   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish