OSCommerce Session Fixation Vulnerability

2009.04.05
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

There is a flaw in the way OSCommerce handles sessions. When a client visits a OSCommerce web page, the server sends a cookie. That cookie will be the session cookie for every further requests. Thus, once logged in, the cookie will be used to authenticate the user. When logging in (without cookies), the URL will look something like http://myserver/myapp/index.php?oscid=sometext An attacker can send a link crafted like that http://myserver/myapp/index.php?oscid=arbitrarysession. If the admin/user follows the link and logs in, his cookie will still be arbitrarysession. Thus, the attacker can hijack the session because he set the cookie. P.S. Thanks to the whole TeaM Random (www.etsmtl.ca) for this bug.

References:

http://seclists.org/bugtraq/2009/Apr/0013.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top