CAPEC-196: Session Credential Falsification through Forging

ID CAPEC-196
Typical Severity Medium
Likelihood Of Attack Medium
Status Draft

An attacker creates a false but functional session credential in order to gain or usurp access to a service. Session credentials allow users to identify themselves to a service after an initial authentication without needing to resend the authentication information (usually a username and password) with every message. If an attacker is able to forge valid session credentials they may be able to bypass authentication or piggy-back off some other authenticated user's session. This attack differs from Reuse of Session IDs and Session Sidejacking attacks in that in the latter attacks an attacker uses a previous or existing credential without modification while, in a forging attack, the attacker must create their own credential, although it may be based on previously observed credentials.

https://capec.mitre.org/data/definitions/196.html

Weaknesses

# ID Name Type
CWE-384 Session Fixation weakness
CWE-664 Improper Control of a Resource Through its Lifetime weakness
Loading...