Guys,
Anybody has time to code a new audit plugin, that will find
session fixation vulnerabilities?
Basically the plugin needs to:
- Read if there is a current cookie parameter names (PHPSESSID=... ; FOOBAR=...)
- Append the cookie parameter to the URL:
* /the/url/?id=1&PHPSESSID=w3af-session-fixation
* /the/url/?id=1&FOOBAR=w3af-session-fixation
- Analyze the response of each request, and see if there is a
set-cookie header in the response with the w3af-session-fixation
string.
I could do it, but I would rather delegate this task, as it is
simple, and someone that is starting to develop in w3af can learn a
lot by giving it a try.
Thanks!
Cheers,
--
Andrés Riancho
Founder, Bonsai - Information Security
http://www.bonsai-sec.com/
http://w3af.sf.net/
------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day
trial. Simplify your report design, integration and deployment - and focus on
what you do best, core application coding. Discover what's new with
Crystal Reports now. http://p.sf.net/sfu/bobj-july
_______________________________________________
W3af-develop mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-develop