Session Stored Lockout Flags Abuse
Variants:
Direct
Vector Type:
Attack
Relevance:
Generic
Layer:
Application-Level
Platforms:
Any
Target Type:
Application
Affected Mechanisms:
Account Lockout, Anti-Automation, Session Management, Secure Design
Invented In:
01/01/1999
Added In:
19/12/2014
Vector Operation Method:
Attackers performing credential brute force attacks on specific accounts can replace session identifiers once the account has been locked, due to a programming flaw that stores the lock flag in a non-persistent location.