Welcome! Log In Create A New Profile

Advanced

Pentest reveal Improper Session Handling in webdev ver 23

Posted by Peter Zhou 
Hi,

A team of pentest found the following for webdev version 23 developed with dynamic webdev (session):-

Improper Session Handling
This vulnerability can be exploited with ease and network access to the system by an attacker who does not have access to credentials with some impact on confidentiality, no impact to integrity of information and without affecting the availability of the information or
system. Successful attacks require human interaction from a person other than the attacker. There are currently no exploits in the public domain. However, attacks may be well described or privately held.

The application maintains a user's authenticated state by appending a session identifier to the URL path. Submitting sensitive information within URLs is not considered best practice, as this data can be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers. URLs can also be displayed on-screen, bookmarked, or shared by users.

HTTP method GET
Port 443
Impact An attacker can obtain users' session identifiers with greater ease, as they are more prone to being disclosed when submitted within URLs the session identifier within the URL path, which is the sole requirement to access post authentication pages
Solution : Consider handling sessions using properly secured cookies or HTTP authentication headers.

Any suggestion on how to resolve under WEBDEV ?

Regards,

PETER ZHOU
pao
Re: Pentest reveal Improper Session Handling in webdev ver 23
April 29, 2024 02:33PM
Under webdev only i don't know how to do it.

You can use the cookie solution, one example is use one session cookie and one global variable to store some random information (for instance one GUID) and in every page check if thew value in the cookie is the same as you ahve in global varialbe. If not close the session.

Regards

Paulo Oliveira
Author:

Your Email:


Subject:


Spam prevention:
Please, enter the code that you see below in the input field. This is for blocking bots that try to post this form automatically. If the code is hard to read, then just try to guess it right. If you enter the wrong code, a new image is created and you get another chance to enter it right.
Message: