R025. Manage concurrent sessions

Requirement

The concurrent sessions of a system must be informed or controlled.

Description

A system that uses authenticated access sessions associated with unique users may allow simultaneous access with the same credentials. This may pose a risk for the service, the information and the system users, by allowing malicious users to interact simultaneously with the system using a valid user, leading to undetected identity thefts, unauthorized actions in name of the user (impersonation) and a loss of traceability of the impersonated user’s actions [1] [2].

Implementation

  1. Restrict or remove concurrent sessions: Configure in the system the option to restrain the simultaneous connections using the same access credentials, either from an external authentication system or from the same system.

Attacks

  1. An attacker logs in simultaneously using the account of a valid user.

  2. An attacker performs actions without traceability nor authorization.

Attributes

  1. Layer: Application Layer.

  2. Asset: Session Management.

  3. Scope: Integrity.

  4. Phase: Operation.

  5. Control Type: Procedure.

References

  1. CAPEC-227: Sustained Client Engagement. An adversary attempts to deny legitimate users access to a resource by continually engaging a specific resource in an attempt to keep the resource tied up as long as possible.

  2. CWE-384: Session Fixation. Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.

  3. NIST 800-63B 7.1 Session Bindings Secrets used for session binding SHALL be generated by the session host during an interaction, typically immediately following authentication.

  4. OWASP Top 10 A2:2017-Broken Authentication. Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities temporarily or permanently.

  5. OWASP-ASVS v4.0.1 V2.2 General Authenticator Requirements.(2.2.3) Verify that secure notifications are sent to users after updates to authentication details, such as credential resets, email or address changes, logging in from unknown or risky locations.

  6. OWASP-ASVS v4.0.1 V3.2 Session Binding Requirements.(3.2.1) Verify the application generates a new session token on user authentication.

  7. [PCI DSS 3.0] 6.5.10 Broken authentication and session management.

  8. PCI DSS v3.2.1 - Requirement 6.5.10 Address common coding vulnerabilities in software-development processes such as broken authentication and session management.

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy