shared-session-cookies

1 article
sort: new top best
clear filter
0 9/10

Uber's SSO system based on shared session cookies across *.uber.com subdomains was vulnerable to authentication bypass via a combination of subdomain takeover on saostatic.uber.com (dangling CloudFront CNAME) and session cookie theft through CSRF token relay attacks. An attacker could compromise any *.uber.com subdomain to steal the '_csid' shared session cookie and relay CSRF tokens to impersonate authenticated users across all Uber subdomains.

Uber Amazon CloudFront saostatic.uber.com auth.uber.com Arne Swinnen Frans Rosén Jack Whitton
arneswinnen.net · devanshbatham/Awesome-Bugbounty-Writeups · 6 hours ago · details