General Information

Session Stored Lockout Flags Abuse

Variants:
Direct 

Vector Type:
Attack

Relevance:
Generic

Layer:
Application-Level

Platforms:
Any

Target Type:
Application

Affected Mechanisms:
Account Lockout, Anti-Automation, Session Management, Secure Design

Invented In:
01/01/1999

Added In:
19/12/2014


Vector Operation Method:
Attackers performing credential brute force attacks on specific accounts can replace session identifiers once the account has been locked, due to a programming flaw that stores the lock flag in a non-persistent location.


Direct Variant:

Session Stored Lockout Flags Abuse

Variant Title:
Session Stored Lockout Flags Abuse

Typical Severity:
Medium

Resources:

White Papers:

Learn More: