LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-15-2008, 04:37 PM   #1
abefroman
Senior Member
 
Registered: Feb 2004
Location: lost+found
Distribution: CentOS
Posts: 1,430

Rep: Reputation: 55
Administrator cookie hijacking? Fact or Fiction?


This is a false vulnerability, correct? You won't be able to see the cookie, unless you are on the administrators computer, and logged in as him right?

Cross Site Scripting Vulnerability 1 :

Vulnerable File : administrator/popups/index3pop.php

Vulnerable Line (5) : <title><?php echo $mosConfig_sitename; ?> - Administration [Mambo]</title>

Vulnerable Variable : mosConfig_sitename

For Example : http://Example/administrator/popups/index3pop.php?mosConfig_sitename=</title><script>alert(document.cookie)</script>

Attacker can hijack administrator cookie and session and login with they
 
Old 09-15-2008, 01:28 PM   #2
Midas7g
LQ Newbie
 
Registered: Apr 2004
Location: Atlanta, GA
Distribution: Ubuntu 8.04
Posts: 6

Rep: Reputation: 0
http://www.milw0rm.com/exploits/6438

It's not quite so simple as that. An Authentication Bypass Exploit is one of the trickier Cross Site Scripting Exploits out there. By posting code on a particular site that you know an administrator goes to, you can extract the cookie he used to authenticate. You can then use that cookie (until it expires or the administrator logs off) to perform administrative actions on the site.

An easy fix for mostly disabling this exploit is to associate a randomly-generated session key with the cookie. As the administrator posts data or navigates pages, generate the key and put it in the POST or COOKIE. When the next page loads, compare the key in the session with the key in the POST or COOKIE. If they match, the administrator is authenticated and you destroy the key.

If the cookie is intercepted, the key it contains is only valid for that one single transfer, and cannot be used for other possibly malicious means.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: StorYBook gets in the way of plotting fiction LXer Syndicated Linux News 0 06-06-2008 07:10 PM
LXer: The Convenient Fiction of Distributions LXer Syndicated Linux News 0 12-01-2007 12:00 PM
LXer: Open Source ERP: Fact and Fiction LXer Syndicated Linux News 0 03-26-2007 12:01 AM
LXer: IT skills shortage — fact or fiction? LXer Syndicated Linux News 0 06-26-2006 12:33 AM
LXer: Goobuntu, the Google operating system: fact or fiction? LXer Syndicated Linux News 0 02-01-2006 12:46 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:06 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration