Dark Mode

Settings

Capec-60 Detail

Reusing Session IDs (aka Session Replay)

Detailed Software Likelihood: High Typical Severity: High

Parents: 593

Threats: T292 T293 T377

Description

This attack targets the reuse of valid session ID to spoof the target system in order to gain privileges. The attacker tries to reuse a stolen session ID used previously during a transaction to perform spoofing and session hijacking. Another name for this type of attack is Session Replay.

Not present

External ID Source Link Description
CAPEC-60 capec https://capec.mitre.org/data/definitions/60.html
CWE-294 cwe http://cwe.mitre.org/data/definitions/294.html
CWE-290 cwe http://cwe.mitre.org/data/definitions/290.html
CWE-346 cwe http://cwe.mitre.org/data/definitions/346.html
CWE-384 cwe http://cwe.mitre.org/data/definitions/384.html
CWE-488 cwe http://cwe.mitre.org/data/definitions/488.html
CWE-539 cwe http://cwe.mitre.org/data/definitions/539.html
CWE-200 cwe http://cwe.mitre.org/data/definitions/200.html
CWE-285 cwe http://cwe.mitre.org/data/definitions/285.html
CWE-664 cwe http://cwe.mitre.org/data/definitions/664.html
CWE-732 cwe http://cwe.mitre.org/data/definitions/732.html
T1134.001 ATTACK https://attack.mitre.org/wiki/Technique/T1134/001 Access Token Manipulation:Token Impersonation/Theft
T1550.004 ATTACK https://attack.mitre.org/wiki/Technique/T1550/004 Use Alternate Authentication Material:Web Session Cookie
REF-1 reference_from_CAPEC G. Hoglund, G. McGraw, Exploiting Software: How to Break Code, 2004--02, Addison-Wesley
Explore
  1. The attacker interacts with the target host and finds that session IDs are used to authenticate users.

  2. The attacker steals a session ID from a valid user.

Exploit
  1. The attacker tries to use the stolen session ID to gain access to the system with the privileges of the session ID's original owner.

  1. The target host uses session IDs to keep track of the users.
  2. Session IDs are used to control access to resources.
  3. The session IDs used by the target host are not well protected from session theft.

Not present

Low Medium
If an attacker can steal a valid session ID, they can then try to be authenticated with that stolen session ID.
More sophisticated attack can be used to hijack a valid session from a user and spoof a legitimate user by reusing their valid session ID.
Authorization Access Control Confidentiality
Gain Privileges Gain Privileges Gain Privileges
  1. OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls. See also: CVE-1999-0428
  2. Merak Mail IceWarp Web Mail uses a static identifier as a user session ID that does not change across sessions, which could allow remote attackers with access to the ID to gain privileges as that user, e.g. by extracting the ID from the user's answer or forward URLs. See also: CVE-2002-0258