[snip]


> ... Short of any severe bugs in PHP's core, there is no way for a
> user of your Web application to modify session data ...

[/snip]

It seems that statement is not completely correct considering the topic discussed in the paper 'Session Fixation Vulnerability in Web-based Applications' (http://secinf.net/uplarticle/11/session_fixation.pdf). I am also interested in the session security issue so any comments on that publication are welcome.

hth,

Boyan
--



Chris Shiflett wrote:

--- Pablo Gosse <[EMAIL PROTECTED]> wrote:

In all honesty I don't know enough about how one would go about
attempting to hack the values of a session other than through hacking
into the session files, so if anyone has any input on this please pass
it along.


Well, you basically hit the nail on the head (which means you're right, in
case that phrase makes no sense to anyone).

Short of any severe bugs in PHP's core, there is no way for a user of your
Web application to modify session data. This data can be modified by you
(so users can potentially modify session data if you have a flaw in your
logic, notably $_SESSION['foo'] = $_GET['foo']), or by physical access to
the session data store (/tmp, a database, or whatever).

So, as far as writing PHP goes, concern yourself with ensuring all data is
filtered prior to being stored in the session. A strict naming convention
can help here.

As far as the environment goes, there are of course many more factors, but
you basically want to protect your session data store as you would
personal user data or anything else like that.

Hope that helps.

Chris

=====
My Blog
     http://shiflett.org/
HTTP Developer's Handbook
     http://httphandbook.org/
RAMP Training Courses
     http://www.nyphp.org/ramp


-- PHP General Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php



Reply via email to