结构: Simple
Abstraction: Base
状态: Incomplete
被利用可能性: unkown
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
cwe_Nature: ChildOf cwe_CWE_ID: 672 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 672 cwe_View_ID: 1003 cwe_Ordinal: Primary
cwe_Nature: CanPrecede cwe_CWE_ID: 287 cwe_View_ID: 1000
cwe_Nature: CanPrecede cwe_CWE_ID: 287 cwe_View_ID: 699
范围 | 影响 | 注释 |
---|---|---|
Access Control | Bypass Protection Mechanism |
策略:
Set sessions/credentials expiration date.
The following snippet was taken from a J2EE web.xml deployment descriptor in which the session-timeout parameter is explicitly defined (the default value depends on the container). In this case the value is set to -1, which means that a session will never expire.
bad Java
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
WASC | 47 | Insufficient Session Expiration |