Weak Session ID Implementation - No Session change on Password change
Medium
U
Unikrn
Submitted None
Actions:
Reported by
cosmopolitan_fi
Vulnerability Details
Technical details and impact analysis
**Summary:** [Weak session id implementation]
**Description:** [Unikrn does not change session id after password is changed. Reusing same session ids, after password is changed is highly risky.
Example scenario: Hacker has successfully brute forced the password of a victim and has access to the account. The victim notices that something's off and chooses to change the password of the account. Hacker has still full access to the account, even after the password is changed, because of the working session id that he got from the server when he logged in to the victim's account.]
## Steps To Reproduce:
(Add details for how we can reproduce the issue)
1. [Intercept requests when logged in to unikrn and retrieve current session id]
2. [Change the password of the user]
3. [Do the step 1 again and compare the session id]
## Supporting Material/References:
If necessary, check my Proof of Concept video.
https://drive.google.com/file/d/0B28KqsVY5jK6aVdTYzg5RTNMcGM/view
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$40.00
Submitted
Weakness
Insufficient Session Expiration