Weak Session Management Detected

high Web App Scanning Plugin ID 112794

Synopsis

Weak Session Management Detected

Description

A web session is a set of HTTP transactions issued by a user within a given time frame. Web applications use sessions to retain information about each user, keep track of their activity or define proper access rights and permissions. Each session has an identifier (token or ID) defined by the application to bind users to their HTTP traffic, being temporarily equivalent to the strongest authentication method used by the application for authenticated sessions.

By targeting the session management mechanism, attackers can hijack other users sessions to impersonate these users and use their privileges in the application or access sensitive information.

Solution

Web applications must enforce a strong session management to avoid session forgery, predictability or reuse. The session ID must be long enough (at least 128 bits) to prevent bruteforce attacks to determine valid sessions. It must be uniq in the current session context of the application, and its entropy has to be random enough (at least 64 bits) to avoid guessing attacks or statistical analysis. Finally, sessions must have a limited lifetime and their IDs must be invalidated after a logout, an idle time or an absolute timeout.

See Also

https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html

https://www.sans.org/reading-room/whitepapers/webservers/secure-session-management-preventing-security-voids-web-applications-1594

Plugin Details

Severity: High

ID: 112794

Type: remote

Published: 5/20/2021

Updated: 11/26/2021

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: Tenable

CVSS v3

Risk Factor: High

Base Score: 7.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS Score Source: Tenable

Reference Information