From: Stephen de Vries (stephen@twisteddelight.org)
Date: Fri Dec 05 2003 - 09:09:40 EST
I don't think you need to be able to spoof your IP to prove the security
risk. As you've already proved the attack works if you're using the same
source IP address (from the applications point of view) as the victim.
There are quite a few ISPs and companies that use proxies or NAT that give
many users the same IP address. Admittedly, the scope of the attack is
narrow (e.g. work colleagues attacking each other) but it's still a valid
attack.
Stephen
> Hi,
>
> I've found a vulnerability in a Web App which
> gave me via an XSS the sessionID token.
>
> I would like to replay this token. But the
> session ID manager (on the server) seems to look
> also to IP adresses.
>
> So my question is: Is there a way to spoof my ip
> address in order to replay the sessionID??
>
> Like:
> http://www.tutu.com/toto.php?sessionid=32443243
> and some how spoof of my IP?!
>
> If I replay the sessionid from my machine or an
> other machine behind my NAT (same outside IP) it
> works!!
>
> Thanks a lot for your help
>
> _______________________________________________
>
> La messagerie gratuite des romands : 10 MO !!!
> Profitez-en ! >>> http://www.romandie.com
>
> ---------------------------------------------------------------------------
> ----------------------------------------------------------------------------
>
---------------------------------------------------------------------------
----------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:43 EDT