{"id":20493871,"url":"https://github.com/qeeqbox/session-fixation","last_synced_at":"2026-03-19T16:04:45.332Z","repository":{"id":104219168,"uuid":"483914393","full_name":"qeeqbox/session-fixation","owner":"qeeqbox","description":"A threat actor may trick a user into using a known session identifier to log in. after logging in, the session identifier is used to gain access to the user's account","archived":false,"fork":false,"pushed_at":"2024-01-29T01:00:35.000Z","size":250,"stargazers_count":2,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-06-23T01:42:59.518Z","etag":null,"topics":["example","fixation","infosecsimplified","metadata","qeeqbox","session","visualization","vulnerability"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"agpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/qeeqbox.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2022-04-21T05:11:16.000Z","updated_at":"2023-07-22T07:10:39.000Z","dependencies_parsed_at":"2024-01-29T02:43:19.181Z","dependency_job_id":null,"html_url":"https://github.com/qeeqbox/session-fixation","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/qeeqbox/session-fixation","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fsession-fixation","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fsession-fixation/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fsession-fixation/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fsession-fixation/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/qeeqbox","download_url":"https://codeload.github.com/qeeqbox/session-fixation/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fsession-fixation/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":30006762,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-02T14:08:50.421Z","status":"ssl_error","status_checked_at":"2026-03-02T14:08:50.037Z","response_time":60,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["example","fixation","infosecsimplified","metadata","qeeqbox","session","visualization","vulnerability"],"created_at":"2024-11-15T17:37:12.000Z","updated_at":"2026-03-02T14:38:23.647Z","avatar_url":"https://github.com/qeeqbox.png","language":null,"readme":"\u003cp align=\"center\"\u003e \u003cimg src=\"https://raw.githubusercontent.com/qeeqbox/session-fixation/main/session-fixation.png\"\u003e\u003c/p\u003e\n\nA threat actor may trick a user into using a known session identifier to log in. after logging in, the session identifier is used to gain access to the user's account.\n\n## Example #1\n1. Threat actor visits the vulnerable website without logging in and obtains a session identifier\n2. Threat actor tricks a victim into logging into the vulnerable website using the session identifier\n3. Threat actor uses the same session identifier to gain unauthorized access to the victim's account\n\n## Impact\nVary\n\n## Risk\n- Gain unauthorized access\n\n## Redemption\n- Identity confirmation\n- Regenerate session ids at authentication\n- Timeout and replace old session ids\n- Store ids in HTTP cookies\n\n## ID\necd7744c-83b0-406c-a58d-63d057a5570b\n\n## References\n- [wiki](https://en.wikipedia.org/wiki/session_fixation)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fqeeqbox%2Fsession-fixation","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fqeeqbox%2Fsession-fixation","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fqeeqbox%2Fsession-fixation/lists"}