apps.owncloud.com: Session Cookie in URL can be captured by hackers
Unknown
Vulnerability Details
Session Cookie in URL
URL: https://apps.owncloud.com/stories/feed+rss
Issue detail
The URL in the request appears to contain a PHP Session token within the query string:
https://apps.owncloud.com/stories/feed+rss?id=42590&PHPSESSID=ee0624300266683a4625aabea344212a
Issue background
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. **They may be disclosed to third parties via the Referer header when any off-site links are followed**. Placing session tokens into the URL increases the risk that they will be captured by an attacker.
Issue remediation
Applications should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.
Note: In your webpage, all `<a href=` contain PHPSESSID URL Parameter, which further increases this risk.
Actions
View on HackerOneReport Stats
- Report ID: 83667
- State: Closed
- Substate: resolved
- Upvotes: 2