Increasing severity of elmah logs exposure that can lead to session hijacking
parent
be3d7f3a18
commit
fe388f7da9
|
@ -3,9 +3,9 @@ id: elmah-log-file
|
|||
info:
|
||||
name: ELMAH Exposure
|
||||
author: shine,idealphase
|
||||
severity: medium
|
||||
severity: high
|
||||
description: |
|
||||
ELMAH (Error Logging Modules and Handlers) is an application-wide error logging facility that is completely pluggable. It can be dynamically added to a running ASP.NET web application, or even all ASP.NET web applications on a machine, without any need for re-compilation or re-deployment.
|
||||
ELMAH (Error Logging Modules and Handlers) is an application-wide error logging facility that is completely pluggable. It can be dynamically added to a running ASP.NET web application, or even all ASP.NET web applications on a machine, without any need for re-compilation or re-deployment. In some cases, the logs expose ASPXAUTH cookies allowing to hijack a logged in administrator session.
|
||||
reference:
|
||||
- https://code.google.com/archive/p/elmah/
|
||||
- https://www.troyhunt.com/aspnet-session-hijacking-with-google/
|
||||
|
|
Loading…
Reference in New Issue