Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
RE: (ip validation) Whitepaper "SESSION RIDING - A Widespread Vulnerability in Today's Web Applications"
From: Evans, Arian (Arian.Evansfishnetsecurity.com)
Date: Wed Dec 22 2004 - 11:22:08 CST
The attacker didn't create the session though. Sverre is right.
That's why "session riding" requires getting the user to execute
arbitrary code or actions through the vehicles of phishing, luring,
or social engineering. If the attacker had created the session
a priori there wouldn't be a valid user session to be "riding".
Perhaps though you bring up another important aspect we have not
looked at: What if an attacker creates a known bad/poisoned session
and then hands that off to the user, perhaps by swaping their
good session cookie for the bad session cookie?
We could write a whole new whitepaper on this. Thoughts on names?
"Session Swapping" has illiteration, however, I am more fond of:
"Session Castling". It sounds a lot cooler and ensures one's clients
stay confused as to exactly what the heck you're really talking about.
Other options for naming abound; I'm open to suggestions:
> -----Original Message-----
> From: Elihu Smails [mailto:elihusmails2000yahoo.com]
> Sent: Tuesday, December 21, 2004 12:48 PM
> To: Sverre H. Huseby
> Cc: webappsecsecurityfocus.com
> Subject: Re: Whitepaper "SESSION RIDING - A Widespread
> Vulnerability in Today's Web Applications"
> But you have already stored the IP address of the
> attacker who created the session. Therefore when the
> victim connects to your web app, you do not allow them
> in because the IP address does not match what is
> currently stored in the session information.
> --- "Sverre H. Huseby" <shhthathost.com> wrote:
> > [Elihu Smails]
> > | Sessions should track the remote IP address of
> > the client at a
> > | minimum, so that this problem could go away.
> > Unfortunately, checking IP addresses won't solve the
> > Session Riding /
> > Web Trojan problem, as the request is coming from
> > the victim's
> > computer.
> > Sverre.
> Do you Yahoo!?
> Dress up your holiday email, Hollywood style. Learn more.
The information transmitted in this e-mail is intended only for the addressee and may contain confidential and/or privileged material.
Any interception, review, retransmission, dissemination, or other use of, or taking of any action upon this information by persons or entities
other than the intended recipient is prohibited by law and may subject them to criminal or civil liability. If you received this communication
in error, please contact us immediately at 816.421.6611, and delete the communication from any computer or network system.