Cookie Replay 🍪🔓

Vikas Rai
2 min readDec 27, 2024

--

When conducting penetration tests, sometimes the simplest methodologies can yield the most profound results. While testing a well-secured web application, I discovered a vulnerability that allowed session cookies to be reused across different browsers and systems. This vulnerability is known as “Session Fixation or Cookie Replay”, and its impact can be severe, potentially allowing unauthorized access to user accounts.

Steps to Reproduce the Vulnerability 🚨

1️⃣ Login on one browser:
Open the web application and log in using valid credentials.
(Note: The credentials were provided by the organization)

Dashboard after login

2️⃣ Copy the cookies of this session:
I used cookie editor chrome extension to copy the cookies.

Copying the cookies

3️⃣ Paste the cookie onto another browser:

4️⃣ You’re logged in on another browser too! 🎉

Impact:

  • Allows an attacker to hijack user sessions, leading to unauthorized access.
  • Could compromise sensitive user data and actions.
  • Violates session management best practices, increasing the attack surface for further exploits.

This is a P2 bug because the vulnerability allows complete account takeover, which is a major security concern.

As cybersecurity professionals, our mission is to think like an attacker, question every assumption, and protect users from risks they might never see coming.

🔍 Remember: The difference between a secure application and a breached one is often the dedication to small details. So, keep digging, stay curious, and trust your instincts. You never know when a cookie might crumble… 🍪😉

Happy Hacking !

--

--

Vikas Rai
Vikas Rai

Written by Vikas Rai

I'm a cybersecurity enthusiast and bug bounty hunter with a passion for uncovering vulnerabilities and enhancing web security.

Responses (1)