SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Automated Detection of Session Fixation Vulnerabilities
               Yusuke Takamatsu†            Yuji Kosuga†            Kenji Kono†‡
           yusuke@sslab.ics.keio.ac.jp yuji@sslab.ics.keio.ac.jp kono@ics.keio.ac.jp
                                       †
                                        Department of Information and Computer Science
                                                        Keio University
                                    ‡
                                      Core Research for Evolutional Science and Technology
                                            Japan Science and Technology Agency


ABSTRACT
                                                                                                       4"#5&61+
Session fixation is a technique for obtaining the visitor’s ses-
sion identifier (SID) by forcing the visitor to use the SID                 D33.2E,-               8"#9::),#$9;
                                                                                                                   !"#$%&'(
supplied by the attacker. The attacker who obtains the vic-        <"#=&-2,#>12317#3&#
tim’s SID can masquerade as the visitor. In this paper, we          :,+?#.#-,@),:3                       !"#$%&&' !"#$%&'(
propose a technique to automatically detect session fixation              !"#$%&'(
                                                                                                                    !"#$%&'(
vulnerabilities in web applications. Our technique uses at-                                  A"#B,3#.#*&61+#'&-7
tack simulator that executes a real session fixation attack                                                 C"#5&61+#             ()*+,-./*,
and check whether it is successful or not. In the experi-                           (12317                                     0,/#.%%*12.31&+
ment, our system successfully detected vulnerabilities in our
original test cases and in a real world web application.                              Figure 1: Session Fixation

Categories and Subject Descriptors                                   We propose a technique to automatically detect session
D.2.5 [Software]: Software Engineering—Testing and De-            fixation vulnerabilities in web applications. Our technique
bugging; K.6.5 [Management of Computing and Infor-                is effective in detecting vulnerabilities because it executes a
mation Systems]: Security and Protection                          real session fixation attack and check whether it is success-
                                                                  ful or not. Technically, our technique first checks whether
General Terms                                                     an SID is changed after a user’s login, then it goes on to
                                                                  the phase of attack simulation. In the experiment, our sys-
Security                                                          tem successfully detected vulnerabilities in our original test
                                                                  cases. We also performed a test on a real world web appli-
Keywords                                                          cation, in which our system detected a vulnerability.
session fixation, web application security
                                                                  2.   SESSION FIXATION
                                                                     Session fixation [1] is an attack technique that forces a
1. INTRODUCTION                                                   visitor to use an SID that the attacker prepared. After the
   Many of recent web applications employ session manage-         visitor’s login, the attacker can masquerade as the visitor by
ment to keep track of a visitor’s activity over the inherently    accessing the web application with the SID.
stateless protocol such as HTTP. A session identifier (SID)           In Figure 1, the attacker logs into the vulnerable web ap-
is usually a hash value uniquely assigned by the web appli-       plication to obtain an SID, which is usually contained in an
cation for the purpose of session management and is usually       HTTP header or a part of the response document (Step 1
granted to the visitor on his first visit to the web applica-      & 2). Then, the attacker extracts the SID to embed it into
tion. The SID is an attractive target for attackers because       an anchor and lure the victim into clicking on it to send
attackers can masquerade as the visitor if they can obtain        a request to the web application (Step 3 & 4). The web
the visitor’s SID. Session fixation [1] is a technique for ob-     application establishes a session with the visitor. After the
taining the visitor’s SID by forcing the visitor to use the SID   victim’s login while the session is valid, the attacker can
supplied by the attacker. Although session fixation vulner-        spoof the victim’s identity (Step 5 & 6).
ability can be eliminated in the development phase of web            Session fixation can be avoided by assigning a new SID
applications, it is laborious to setup a test environment and     each time user logs in to avoid using the SID that the at-
imposes the intimate knowledge of the attack on the people        tacker prepared. Restricting the SID usage, for example,
who conduct the test. According to a report from White-           by binding an SID to another information such as a special
Hat [3], 12% of websites are vulnerable to session fixation        token or the browser’s network address, is also effective to
and it takes 106 days on average to fix an vulnerability.          prevent session fixation. These countermeasures should be
                                                                  implemented in web applications. Even when the web ap-
                                                                  plication is already in service, the security should be tested.
Copyright is held by the author/owner(s).
WWW 2010, April 26–30, 2010, Raleigh, North Carolina, USA.        However, it is laborious to build a test environment and re-
ACM 978-1-60558-799-8/10/04.                                      quires a detailed knowledge of session fixation.
3. PROPOSAL                                                                           :;;%$%07<.8&
                                                                                                          =-8./7.68
  We propose an effective technique for detecting session
                                                                       9&./
fixation vulnerabilities in web applications by actually at-                                        2=@$A0&$
tempting to perform session fixation attacks. Our technique                    1.&#$203.           7A0-B.CD
                                                                                                                             !"#$%&'(
automatically performs all the steps in session fixation as                                !"#$%"&&'()*$
                                                                                           +,)-./0().                          !"#$%&'(
real attackers do, from the acquisition of an SID to the at-                                                                                4,)-./0().
tacker’s malicious login after the valid user’s login.                                                                                    5.($066)'708'"-
  While current session fixation testing requires knowledge                E.6"/8
and labors, our system can alleviate the burden of test oper-                                      ?8807<./     !"#$%&'(   4'78'>
ators by only offering several simple information as follows.                                         ?8807<$&'>,)08'"/
                                                                                                       ",/$&*&8.>
   • The parameter name that contains an SID (e.g., PH-
     PSESSID in PHP)
                                                                                   Figure 2: Design of our system
   • Attacker and victim’s login information (e.g., user name
     and password)
   • Special keywords that only appear in the response mes-       ated deliberately vulnerable to session fixation, and against
     sage after a valid user’s login. (e.g., ‘Welcome victim’)    a real world web application.
With these information, our technique automates the detec-        4.1 Original Test Cases
tion of vulnerabilities with the following three steps.             A web application we created works as a real world web
                                                                  application in terms that it issues an SID in response to the
3.1 Packet Capturing                                              visitor’s first access, but does not re-issue a new SID after the
  Our system lies between a user’s browser and a web appli-       visitor’s login, thus it is vulnerable to session fixation. Our
cation to intercept innocuous HTTP packets between them           system could find this vulnerability and we also confirmed
(Figure 2). When the user browses the web pages before            that it did not raise a false alert to another version of the
and after his login with his browser, our system captures all     web application that we had modified to re-issue a new SID.
the packets to observe the change of SIDs.                          Another web application we created assigns a special to-
                                                                  ken to each visitor at his login and binds it to an SID for
3.2 Initial Inspection                                            identifying visitors. Thus it is safe even when a new SID
   Our system extracts the SIDs from the packets intercepted.     does not re-issue at login. We confirmed the attack simula-
If the SIDs has changed at the user’s login, this step con-       tor in our system detected the vulnerability.
cludes it is not vulnerable since the change of the SIDs at the
login is an effective countermeasure. Otherwise, although          4.2 Testing for Real World Application
it might be vulnerable, it also can be safe due to another           We also executed our system against a real world web
countermeasure implemented. To make it clear, it goes to          application: Mambo [2]. The login page of Mambo was
the next step for further inspection.                             vulnerable to session fixation and we confirmed it by hand
                                                                  before testing with our system.
3.3 Attack Simulation                                                In this experiment, we gave attacker and victim informa-
   In this step, our system launches its attack simulator that    tion in advance: ‘attacker’ for the virtual attacker’s user
automatically generates the same environment as a real at-        name and password, and ‘victim’ for the virtual victim’s
tacker performs session fixation attacks. The simulator has        user name and password. We also set a special keyword as
a virtual attacker and a virtual victim. In the same scenario     ‘Hi, victim’ that indicates the victim’s login. Our system
described in Section 2, the attacker first acquires an SID by      could detect the vulnerability.
logging in with the attacker’s information the user initially
gave to our system.
   After letting the victim access and login to the web appli-
                                                                  5.     CONCLUSION
cation with the SID that the attacker obtained, the attacker        We proposed a technique to automatically detect session
check to see if he can successfully log into the web appli-       fixation vulnerabilities in web applications by executing real
cation with the victim’s identity. To this end, our system        session fixation attacks. It can reduce laborious work for se-
searches the content of the response document for the spe-        curity checking against session fixation. In our experiment, a
cial keyword that the user gave to our system. If the special     prototype version of our system could detect a vulnerability
keyword appears in the response document, our technique           in a real world web application.
considers this web application is vulnerable.
                                                                  6.     REFERENCES
4. EXPERIMENTS                                                    [1] M. Kolˇek. Session Fixation Vulnerability in Web-based
                                                                              s
   We implemented a prototype version of our technique                Applications. http://www.acrossecurity.com/papers/
against two types of session fixation in terms of where an             session fixation.pdf, December 2002.
SID is contained in: a URL or a cookie separately. Other          [2] SecurityFocus. Mambo 4.6.2 CMS - Session fixation
than these, an SID can be delivered via a hidden field in an           Issue in backend Administration interface. http://www.
HTTP response. Additionally, in our current implementa-               securityfocus.com/archive/1/475241, August 2007.
tion, the information that the user specifies is hard-coded.       [3] WhiteHat Security, Inc. Website Security Statistic
   To confirm the effectiveness of our technique, we per-               Report (8th Edition). http://www.whitehatsec.com/
formed experiments against web applications that we cre-              home/resource/stats.html, November 2009.

Más contenido relacionado

La actualidad más candente

ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...IJECEIAES
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Moataz Kamel
 
Beyond the OWASP Top 10
Beyond the OWASP Top 10Beyond the OWASP Top 10
Beyond the OWASP Top 10iphonepentest
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applicationsphanleson
 
Protecting web apps
Protecting web appsProtecting web apps
Protecting web appsOmkar Parab
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksChema Alonso
 
Seminar2015Bilic_Nicole
Seminar2015Bilic_NicoleSeminar2015Bilic_Nicole
Seminar2015Bilic_NicoleNicole Bili?
 
Neoito — Secure coding practices
Neoito — Secure coding practicesNeoito — Secure coding practices
Neoito — Secure coding practicesNeoito
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud appsCenzic
 
How "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersHow "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersChema Alonso
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...IRJET Journal
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information SecurityShannon Cuthbertson
 
Prevoty NYC Java SIG 20150730
Prevoty NYC Java SIG 20150730Prevoty NYC Java SIG 20150730
Prevoty NYC Java SIG 20150730chadtindel
 
Computer security Description about SQL-Injection and SYN attacks
Computer security Description about SQL-Injection and SYN attacksComputer security Description about SQL-Injection and SYN attacks
Computer security Description about SQL-Injection and SYN attacksTesfahunegn Minwuyelet
 

La actualidad más candente (20)

OWASP Top 10
OWASP Top 10OWASP Top 10
OWASP Top 10
 
C01461422
C01461422C01461422
C01461422
 
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
 
Beyond the OWASP Top 10
Beyond the OWASP Top 10Beyond the OWASP Top 10
Beyond the OWASP Top 10
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Protecting web apps
Protecting web appsProtecting web apps
Protecting web apps
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution Attacks
 
Seminar2015Bilic_Nicole
Seminar2015Bilic_NicoleSeminar2015Bilic_Nicole
Seminar2015Bilic_Nicole
 
Secure coding-guidelines
Secure coding-guidelinesSecure coding-guidelines
Secure coding-guidelines
 
1738 1742
1738 17421738 1742
1738 1742
 
Neoito — Secure coding practices
Neoito — Secure coding practicesNeoito — Secure coding practices
Neoito — Secure coding practices
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
 
How "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersHow "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scanners
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
Prevoty NYC Java SIG 20150730
Prevoty NYC Java SIG 20150730Prevoty NYC Java SIG 20150730
Prevoty NYC Java SIG 20150730
 
Computer security Description about SQL-Injection and SYN attacks
Computer security Description about SQL-Injection and SYN attacksComputer security Description about SQL-Injection and SYN attacks
Computer security Description about SQL-Injection and SYN attacks
 

Destacado

626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention ToolsSplitty
 
Intrusion detection system with GA
Intrusion detection system with GAIntrusion detection system with GA
Intrusion detection system with GAChungHsiangHsueh
 
Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detectionPiyu Karande
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Masquerader Detection
Masquerader DetectionMasquerader Detection
Masquerader DetectionArquam Md
 
Dr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiDr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiAyurvetAks
 

Destacado (6)

626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Intrusion detection system with GA
Intrusion detection system with GAIntrusion detection system with GA
Intrusion detection system with GA
 
Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Masquerader Detection
Masquerader DetectionMasquerader Detection
Masquerader Detection
 
Dr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiDr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhi
 

Similar a Automated Detection of Session Fixation Vulnerabilities

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionDaniel Owens
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorunNimrod Levy
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copyNimrod Levy
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks Ahmed Sherif
 
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...Quek Lilian
 
Web Security - Introduction
Web Security - IntroductionWeb Security - Introduction
Web Security - IntroductionSQALab
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Oles Seheda
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Identifying & fixing the most common software vulnerabilities
Identifying & fixing the most common software vulnerabilitiesIdentifying & fixing the most common software vulnerabilities
Identifying & fixing the most common software vulnerabilitiesAlireza Aghamohammadi
 
Meetup DotNetCode Owasp
Meetup DotNetCode Owasp Meetup DotNetCode Owasp
Meetup DotNetCode Owasp dotnetcode
 
Web Intrusion Detection
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection Abhishek Singh
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecuritiesamiable_indian
 
Liferay hardening principles
Liferay hardening principlesLiferay hardening principles
Liferay hardening principlesAmbientia
 
IRJET- Insider Interruption Identification and Protection by using Forens...
IRJET-  	  Insider Interruption Identification and Protection by using Forens...IRJET-  	  Insider Interruption Identification and Protection by using Forens...
IRJET- Insider Interruption Identification and Protection by using Forens...IRJET Journal
 

Similar a Automated Detection of Session Fixation Vulnerabilities (20)

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
 
Session fixation
Session fixationSession fixation
Session fixation
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorun
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copy
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
 
Super1
Super1Super1
Super1
 
J0704055058
J0704055058J0704055058
J0704055058
 
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
 
Web Security - Introduction
Web Security - IntroductionWeb Security - Introduction
Web Security - Introduction
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Identifying & fixing the most common software vulnerabilities
Identifying & fixing the most common software vulnerabilitiesIdentifying & fixing the most common software vulnerabilities
Identifying & fixing the most common software vulnerabilities
 
Meetup DotNetCode Owasp
Meetup DotNetCode Owasp Meetup DotNetCode Owasp
Meetup DotNetCode Owasp
 
predefense presentation
predefense presentationpredefense presentation
predefense presentation
 
Web Intrusion Detection
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Liferay hardening principles
Liferay hardening principlesLiferay hardening principles
Liferay hardening principles
 
IRJET- Insider Interruption Identification and Protection by using Forens...
IRJET-  	  Insider Interruption Identification and Protection by using Forens...IRJET-  	  Insider Interruption Identification and Protection by using Forens...
IRJET- Insider Interruption Identification and Protection by using Forens...
 

Último

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 

Último (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 

Automated Detection of Session Fixation Vulnerabilities

  • 1. Automated Detection of Session Fixation Vulnerabilities Yusuke Takamatsu† Yuji Kosuga† Kenji Kono†‡ yusuke@sslab.ics.keio.ac.jp yuji@sslab.ics.keio.ac.jp kono@ics.keio.ac.jp † Department of Information and Computer Science Keio University ‡ Core Research for Evolutional Science and Technology Japan Science and Technology Agency ABSTRACT 4"#5&61+ Session fixation is a technique for obtaining the visitor’s ses- sion identifier (SID) by forcing the visitor to use the SID D33.2E,- 8"#9::),#$9; !"#$%&'( supplied by the attacker. The attacker who obtains the vic- <"#=&-2,#>12317#3&# tim’s SID can masquerade as the visitor. In this paper, we :,+?#.#-,@),:3 !"#$%&&' !"#$%&'( propose a technique to automatically detect session fixation !"#$%&'( !"#$%&'( vulnerabilities in web applications. Our technique uses at- A"#B,3#.#*&61+#'&-7 tack simulator that executes a real session fixation attack C"#5&61+# ()*+,-./*, and check whether it is successful or not. In the experi- (12317 0,/#.%%*12.31&+ ment, our system successfully detected vulnerabilities in our original test cases and in a real world web application. Figure 1: Session Fixation Categories and Subject Descriptors We propose a technique to automatically detect session D.2.5 [Software]: Software Engineering—Testing and De- fixation vulnerabilities in web applications. Our technique bugging; K.6.5 [Management of Computing and Infor- is effective in detecting vulnerabilities because it executes a mation Systems]: Security and Protection real session fixation attack and check whether it is success- ful or not. Technically, our technique first checks whether General Terms an SID is changed after a user’s login, then it goes on to the phase of attack simulation. In the experiment, our sys- Security tem successfully detected vulnerabilities in our original test cases. We also performed a test on a real world web appli- Keywords cation, in which our system detected a vulnerability. session fixation, web application security 2. SESSION FIXATION Session fixation [1] is an attack technique that forces a 1. INTRODUCTION visitor to use an SID that the attacker prepared. After the Many of recent web applications employ session manage- visitor’s login, the attacker can masquerade as the visitor by ment to keep track of a visitor’s activity over the inherently accessing the web application with the SID. stateless protocol such as HTTP. A session identifier (SID) In Figure 1, the attacker logs into the vulnerable web ap- is usually a hash value uniquely assigned by the web appli- plication to obtain an SID, which is usually contained in an cation for the purpose of session management and is usually HTTP header or a part of the response document (Step 1 granted to the visitor on his first visit to the web applica- & 2). Then, the attacker extracts the SID to embed it into tion. The SID is an attractive target for attackers because an anchor and lure the victim into clicking on it to send attackers can masquerade as the visitor if they can obtain a request to the web application (Step 3 & 4). The web the visitor’s SID. Session fixation [1] is a technique for ob- application establishes a session with the visitor. After the taining the visitor’s SID by forcing the visitor to use the SID victim’s login while the session is valid, the attacker can supplied by the attacker. Although session fixation vulner- spoof the victim’s identity (Step 5 & 6). ability can be eliminated in the development phase of web Session fixation can be avoided by assigning a new SID applications, it is laborious to setup a test environment and each time user logs in to avoid using the SID that the at- imposes the intimate knowledge of the attack on the people tacker prepared. Restricting the SID usage, for example, who conduct the test. According to a report from White- by binding an SID to another information such as a special Hat [3], 12% of websites are vulnerable to session fixation token or the browser’s network address, is also effective to and it takes 106 days on average to fix an vulnerability. prevent session fixation. These countermeasures should be implemented in web applications. Even when the web ap- plication is already in service, the security should be tested. Copyright is held by the author/owner(s). WWW 2010, April 26–30, 2010, Raleigh, North Carolina, USA. However, it is laborious to build a test environment and re- ACM 978-1-60558-799-8/10/04. quires a detailed knowledge of session fixation.
  • 2. 3. PROPOSAL :;;%$%07<.8& =-8./7.68 We propose an effective technique for detecting session 9&./ fixation vulnerabilities in web applications by actually at- 2=@$A0&$ tempting to perform session fixation attacks. Our technique 1.&#$203. 7A0-B.CD !"#$%&'( automatically performs all the steps in session fixation as !"#$%"&&'()*$ +,)-./0(). !"#$%&'( real attackers do, from the acquisition of an SID to the at- 4,)-./0(). tacker’s malicious login after the valid user’s login. 5.($066)'708'"- While current session fixation testing requires knowledge E.6"/8 and labors, our system can alleviate the burden of test oper- ?8807<./ !"#$%&'( 4'78'> ators by only offering several simple information as follows. ?8807<$&'>,)08'"/ ",/$&*&8.> • The parameter name that contains an SID (e.g., PH- PSESSID in PHP) Figure 2: Design of our system • Attacker and victim’s login information (e.g., user name and password) • Special keywords that only appear in the response mes- ated deliberately vulnerable to session fixation, and against sage after a valid user’s login. (e.g., ‘Welcome victim’) a real world web application. With these information, our technique automates the detec- 4.1 Original Test Cases tion of vulnerabilities with the following three steps. A web application we created works as a real world web application in terms that it issues an SID in response to the 3.1 Packet Capturing visitor’s first access, but does not re-issue a new SID after the Our system lies between a user’s browser and a web appli- visitor’s login, thus it is vulnerable to session fixation. Our cation to intercept innocuous HTTP packets between them system could find this vulnerability and we also confirmed (Figure 2). When the user browses the web pages before that it did not raise a false alert to another version of the and after his login with his browser, our system captures all web application that we had modified to re-issue a new SID. the packets to observe the change of SIDs. Another web application we created assigns a special to- ken to each visitor at his login and binds it to an SID for 3.2 Initial Inspection identifying visitors. Thus it is safe even when a new SID Our system extracts the SIDs from the packets intercepted. does not re-issue at login. We confirmed the attack simula- If the SIDs has changed at the user’s login, this step con- tor in our system detected the vulnerability. cludes it is not vulnerable since the change of the SIDs at the login is an effective countermeasure. Otherwise, although 4.2 Testing for Real World Application it might be vulnerable, it also can be safe due to another We also executed our system against a real world web countermeasure implemented. To make it clear, it goes to application: Mambo [2]. The login page of Mambo was the next step for further inspection. vulnerable to session fixation and we confirmed it by hand before testing with our system. 3.3 Attack Simulation In this experiment, we gave attacker and victim informa- In this step, our system launches its attack simulator that tion in advance: ‘attacker’ for the virtual attacker’s user automatically generates the same environment as a real at- name and password, and ‘victim’ for the virtual victim’s tacker performs session fixation attacks. The simulator has user name and password. We also set a special keyword as a virtual attacker and a virtual victim. In the same scenario ‘Hi, victim’ that indicates the victim’s login. Our system described in Section 2, the attacker first acquires an SID by could detect the vulnerability. logging in with the attacker’s information the user initially gave to our system. After letting the victim access and login to the web appli- 5. CONCLUSION cation with the SID that the attacker obtained, the attacker We proposed a technique to automatically detect session check to see if he can successfully log into the web appli- fixation vulnerabilities in web applications by executing real cation with the victim’s identity. To this end, our system session fixation attacks. It can reduce laborious work for se- searches the content of the response document for the spe- curity checking against session fixation. In our experiment, a cial keyword that the user gave to our system. If the special prototype version of our system could detect a vulnerability keyword appears in the response document, our technique in a real world web application. considers this web application is vulnerable. 6. REFERENCES 4. EXPERIMENTS [1] M. Kolˇek. Session Fixation Vulnerability in Web-based s We implemented a prototype version of our technique Applications. http://www.acrossecurity.com/papers/ against two types of session fixation in terms of where an session fixation.pdf, December 2002. SID is contained in: a URL or a cookie separately. Other [2] SecurityFocus. Mambo 4.6.2 CMS - Session fixation than these, an SID can be delivered via a hidden field in an Issue in backend Administration interface. http://www. HTTP response. Additionally, in our current implementa- securityfocus.com/archive/1/475241, August 2007. tion, the information that the user specifies is hard-coded. [3] WhiteHat Security, Inc. Website Security Statistic To confirm the effectiveness of our technique, we per- Report (8th Edition). http://www.whitehatsec.com/ formed experiments against web applications that we cre- home/resource/stats.html, November 2009.