We have a project based on ASP.NET webform with .NET version 4.8 where we have used Infragistics web 21.1.20211.2
We have User Interface where user can upload multiple files of different extension and we have a validation for each files.
While testing the file upload mechanism, it was discovered that Infragistics stores session data in the URL, as depicted in the image below.
User A is authenticated to the application with valid credentials. Now, let's consider a scenario where User B gains access to User A's machine and sees the URL containing the session information. In this situation, User B could potentially upload random files and access sensitive user information using the session key stored in the URL.
While testing with the Burp Suite tool, it was discovered that even after removing the cookies, the file upload process remained successful due to the session being present in the POST URL
Concern:
A random attacker can use session id/key present in the post URL and upload random files to access information. Could you please suggest on this?
The issue described is a Session Fixation vulnerability where attackers exploit session IDs in URLs to upload malicious files and access sensitive information. To mitigate this in Ignite UI for ASP.NET Core, follow these steps:
Review application logs and monitor for suspicious activity to ensure system security.