> Well, more worrisome would be if a bad guy tricks you into clicking on a
> link or simply sends you an image in an email that makes a request to my
> server with a valid-looking session id.  Then if you go to this site (that

    I've debunked that scenario already a few times.  The net
    result is that this class of attacks is impossible to
    prevent.

    The assumption in your scenario and the following is this:

    The attacker has access to a script X which calls
    session_start().

    My scenario:

    1.) Attacker A accesses X and stores the SID which PHP assigns
    to him.

    2.) A crafts a link containing SID and sends it to victim V.

    3.) A keeps SID alive by repeatedly accessing X using SID.

    4.) V opens link and authenticates.

    5.) A's script notices (4).  A can overtake V's session.

    - Sascha


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to