View Issue Details

IDProjectCategoryView StatusLast Update
708Composrcorepublic2025-01-29 17:42
ReporterChris Graham Assigned ToChris Graham  
PrioritynormalSeverityfeature 
Status resolvedResolutionfixed 
Summary708: Increase complexity of session IDs
DescriptionIf someone disables the "Enforce IP addresses for sessions" option, then a brute-force hack-attack (executing within a timeframe of an admin having been active) could steal the admin login.

The brute-force would need to last roughly 11-days (if 10 requests per second): (10^7)/(10*3600*24)
The default session expiry time is significantly less than this.

The following conjunction of events would make a site vulnerable:
 - A hacker attacking a site
 - Run by someone who wasn't noticing the ramp-up in (suspicious) hits
 - Run by someone who'd disabled the "Enforce IP addresses for sessions" option
 - A persistent attack lasting months (multiples of 11-days, hoping for an overlap between guessing a session ID and that session ID having not yet expired)

If we increase the session ID complexity we can reduce the likelihood of a guess significantly.
TagsNo tags attached.
Attach Tags
Time estimation (hours)8
Sponsorship open

Sponsor

Date Added Member Amount Sponsored

Activities

Chris Graham

2012-07-28 20:52

administrator   ~787

Additionally, disabling "Enforce IP addresses for sessions" is bad because if someone does manage to intercept or steal your session ID, they can use that directly. They should not be able to do, but it is better safe than sorry.

PDStig

2025-01-29 17:42

administrator   ~9792

Side note: Session ID complexity was increased even further in v11.

In v10, IDs were 13 character hexadecimals (base 16). In v11, it has been increased to 13-character base 32 (0-9 and a-z except 0, o, 1, and l).

Issue History

Date Modified Username Field Change
2025-01-29 17:42 PDStig Note Added: 0009792