When Session Fixation Meets Session Confusion: A Case of Cross-User Control
文章描述了一次真实的漏洞案例:研究人员通过注入会话cookie,在不同浏览器或设备间实现跨用户会话接管。该漏洞导致同一会话ID下用户身份被非法切换,最终被漏洞赏金计划因风险未被理解而拒绝。 2025-6-18 06:22:37 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

Erkan Kavas

In this post, I’ll share a real-world (very fresh) vulnerability involving improper session management, leading to cross-user session takeover. This bug was rejected by a bug bounty program — not because it was invalid, but because they didn’t understand the risk. Here’s what happened.

thegamer @ image

Let’s say you’re a curious security researcher, playing in scope, obeying all the rules, and just trying to see how the session management works on a certain financial platform which you invited before as a private tester.

You log in as User A in one tab. You grab the session cookie. Nothing weird so far.

Then, in another browser (or device), you inject that session cookie.

🎉 Boom — you’re now also User A, in two browsers. No logout, no OTP, just raw session love.

Now in Browser 1, you log out User A. Then you log in as User B — totally legit.

Go back to Browser 2, refresh…

You’re now User B, without ever logging in again. Same session cookie, same session ID, new user context. It’s like a session identity swap meet.


文章来源: https://infosecwriteups.com/when-session-fixation-meets-session-confusion-a-case-of-cross-user-control-bb2cd0d478e8?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh