Session Fixation Attack on HTTP Cookies

This script is Copyright (C) 2010-2012 Tenable Network Security, Inc.


Synopsis :

The remote web application is vulnerable to a session fixation
attack.

Description :

By manipulating cookies through a vulnerability similar to cross-site
scripting, an attacker can set the session cookies. The legitimate
user will be logged out of the application and after he logs in again,
the cookie will remain unchanged and the attacker will be able to
steal the open session and impersonate the user.

See also :

http://en.wikipedia.org/wiki/Session_fixation
http://www.owasp.org/index.php/Session_Fixation

Solution :

- Fix the application so that the session cookie is re-generated
after a successful authentication.

- Fix the cookie manipulation flaws.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Web Servers

Nessus Plugin ID: 45084 (http_session_fixation.nasl)

Bugtraq ID:

CVE ID: