Improper Session management can cause account takeover[https://micropurchase.18f.gov]
Medium
G
GSA Bounty
Submitted None
Actions:
Reported by
tikoo_sahil
Vulnerability Details
Technical details and impact analysis
Hello,
I would like to report a vulnerability on https://micropurchase.18f.gov where I am able to reuse session cookie of a test user account i accessed through Github.
The problem is that the cookies stored on the browser are not getting expired after logging out from the platform and from Github as well.
Steps to Reproduce:
1. visit https://micropurchase.18f.gov
2. click on sign in through Github
3. Once you are logged in Then Use "BurpSuite" or any other Utility to get the cookies of that session ( "EditThisCookie" Chrome Extension can be used and in a Case of an Attacker he can Use Any Sort Of cookie Stealing Script or Cookies Spoofing Utility to get his hands on cookies ) and grab the cookies of active User Session.
4.Then Logout of the Account from https://micropurchase.18f.gov .
5. Clear all Cookies related to https://micropurchase.18f.gov using [cookies manager+ extension]Then Inject Hijacked User Cookies so that you can get into the user session...
6. After the cookies been injected You will See That the main page showing account and logout parameters on the front end.
Attack Scenario :-- If The Attacker Got his Hands Upon Users Cookies he can Get Access To the User Account.An attacker can get the user session cookies by any means Session Spoofer, Cookie Stealer etc.As the user cookies are not expiring so an attacker can directly inject the stolen cookies of a victim in a request from browser and thus can have access to the victims account.
So expire the cookies once a user is logged out of the website.
POC:- I am providing a video poc :- https://youtu.be/uLFJUJ3CnQQ , its unlisted video.
Regards
sahil tikoo
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Insufficient Session Expiration