https://issues.apache.org/bugzilla/show_bug.cgi?id=51284

             Bug #: 51284
           Summary: Session Fixation is solved without an invalidating of
                    an existing HTTP session
           Product: Tomcat 6
           Version: 6.0.29
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Catalina
        AssignedTo: dev@tomcat.apache.org
        ReportedBy: michael_fur...@hotmail.com
    Classification: Unclassified


Created attachment 27083
  --> https://issues.apache.org/bugzilla/attachment.cgi?id=27083
The AuthenticatorBase.java file with fix that invalidating of an existing HTTP
session after an authentication

Session Fixation Vulnerability is solved recently in Tomcat 6 and in Tomcat 7.
Unfortunately, Session Fixation is solved without an invalidating of an
existing HTTP session.

I do agree, that generation of new session ID solves many Session Fixation
attacks.
Any case, an advanced attacker is able to put a vulnerable object in a known
HTTP session and then force the session on a user.
Please not that in this case the HTTP session will have new ID and an attacker
will not be able to access the session from a client. Any case, with the
vulnerable object in the session he can access to other object and may be even
to send it remotely.
I do recommend to change the implementation and to invalidate the existing HTTP
session after the authentication.
Please find attached code with a fix.  I tested this code in my development
environment.
Best regards,
  Michael 
Security Architect

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to