• Resolved rytis777

    (@rytis777)


    Couldn’t find the topic related to subject if it does exist, post me a link.
    Does anyone know the solution to solve the following vulnerability?

    Session cookies are:
    1: Set-Cookie: _lscache_vary=237bda7cfcf92894df7a4f0dbc1947af
    2: Set-Cookie: _lscache_vary=237bda7cfcf92894df7a4f0dbc1947af
    3: Set-Cookie: _lscache_vary=237bda7cfcf92894df7a4f0dbc1947af
    4: Set-Cookie: _lscache_vary=237bda7cfcf92894df7a4f0dbc1947af
    5: Set-Cookie: _lscache_vary=237bda7cfcf92894df7a4f0dbc1947af

    Percentage of common characters among subsequent cookies: 100%

    The session ID can be trivially guessed after only a limited number of attempts. If this issue is successfully exploited, then it may be possible for an attacker to obtain the cookie-based authentication credentials for legitimate users, allowing unauthorized access to the vulnerable application.

Viewing 3 replies - 1 through 3 (of 3 total)
  • Plugin Support qtwrk

    (@qtwrk)

    did you enable guest mode?

    all the guest users will have this, and once you are logged in , value will change.

    Thread Starter rytis777

    (@rytis777)

    It’s nothing to do with guest mode. Have fixed by enabling session regeneration.

    Plugin Support qtwrk

    (@qtwrk)

    guest mode will serve a cookie with same value to all non-login users ,it is by design

Viewing 3 replies - 1 through 3 (of 3 total)
  • The topic ‘Web Server Predictable Session ID Vulnerability’ is closed to new replies.