[13666] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Session Fixation Vulnerability in Web Based Apps

daemon@ATHENA.MIT.EDU (Nick Popoff)
Wed Jun 18 08:16:35 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 17 Jun 2003 18:19:38 -0700 (PDT)
From: Nick Popoff <cryptic-wasabi@bloodletting.com>
To: Ian Grigg <iang@systemics.com>
Cc: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
In-Reply-To: <3EEF93FB.46AF2EB1@systemics.com>


On Tue, 17 Jun 2003, Ian Grigg wrote:
> does anyone know how the easy way to secure a PHP website against
> session_fixation?

I noticed that the PHP documentation includes a new section on session
insecurity and a link to the paper on session fixation.

http://www.php.net/manual/en/ref.session.php

The latest version of PHP (4.3.2) includes a new function which should be
called by your login processing page as soon as you mark the session as
logged in to generate a new session ID.  That should solve the session
fixation problem since any previous session is discarded by this function.

http://www.php.net/manual/en/function.session-regenerate-id.php

Unfortunately it does seem that anyone using the PHP session generator is
vulnerable until they apply this change. I suspect the PHP mailing lists
have been buzzing about this.  Further discussion of PHP should probably
go there rather than here.


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post