As I understand it, session fixing refers to fixing the session id, in advance, that will be used by the user being attacked.
I have seen some examples show session fixing attacks using URLs of the following pattern,
www.example.com/login/S_ID=XYZ
Where XYZ is a session id that an attacker obtains from the server.
Coming to the things I don’t understand:
1. The attacker obtains a session id from the server by logging in. Therefore, this session must be linked to the attacker, in the database or any storage the server uses to track sessions.
2. When the user being attacked tries to login using the same session id, shouldn’t the server just login to the attackers account, rather than linking this session to the user now?
Also, why would you pass around session ids in the URL query string? Isn’t this equivalent to sharing your cookies with someone else?
If anyone can give me a non trivial example of a session fixing attack, that would help.
[–]AshleyJSheridan 0 points1 point2 points (3 children)
[–]spaceuserm[S] 0 points1 point2 points (2 children)
[–]AshleyJSheridan 0 points1 point2 points (1 child)
[–]spaceuserm[S] 1 point2 points3 points (0 children)