Centralized session management routines are a good programming practice, but like other routines, developers need to understand how they work, how to use them and any limitations. These should preferably be the framework's in-built session management support. If third party session management libraries are used, it is important to test each routine before its implementation.
NB: This relates to what session management routines to use. See SM Q for application-wide coverage.
Peter can bypass the session management controls because they have been self-built and/or are weak, instead of using a standard framework or approved tested module
Owasp ASVS (4.0): 1.1.6
Capec: 21
Owasp SCP: 58,60
Owasp Appsensor:
Safecode: 14,28
ASVS V1.1 - Secure Software Development Lifecycle Requirements
Password Guessing/Brute Force Attacks
Session Hijacking (Man-in-the-Middle)
Loading comments 0%