WhisperX tag archive

#session-hijacking

This page collects WhisperX intelligence signals tagged #session-hijacking. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (9)

The Lab · 2026-04-01 23:27:07 · GitHub Issues

1. ViUR Admin Session Hijack: Open Redirect in `get_cookie_for_app` Exposed Privileged Credentials

A critical open-redirect vulnerability in the ViUR framework's `get_cookie_for_app` endpoint allowed attackers to steal admin session cookies with a single malicious link. The flaw was in the endpoint's handling of the `redirect_to` parameter, which appended the user's session cookie as a plain query parameter to any s...

The Lab · 2026-04-03 11:27:06 · GitHub Issues

2. Rack Ruby Gem Security Patch: Low-Severity Session Hijack Vulnerability via Timing Attacks

A low-severity but critical security vulnerability in the widely-used Rack Ruby web server interface has been patched. The flaw, detailed in a GitHub security advisory, could allow attackers to hijack user sessions through timing attacks. By meticulously measuring the time it takes for a system to look up a session ID,...

The Lab · 2026-04-18 01:22:43 · GitHub Issues

3. Critical JWT Vulnerability: Refresh Tokens Never Invalidate, Enabling Session Hijacking

A critical security flaw has been identified in a JWT (JSON Web Token) implementation where refresh tokens are never invalidated after use. This creates a severe token replay vulnerability, allowing a single compromised refresh token to be reused indefinitely to generate new access tokens. The bug effectively grants an...

The Lab · 2026-04-18 02:22:30 · GitHub Issues

4. Critical JWT Vulnerability: Refresh Tokens Never Invalidate, Enabling Session Hijacking

A critical security flaw has been identified in a JWT (JSON Web Token) implementation where refresh tokens are never invalidated after use. This creates a severe token replay vulnerability, allowing a single compromised refresh token to be reused indefinitely to generate new access tokens. The bug effectively grants an...

The Lab · 2026-04-18 02:22:31 · GitHub Issues

5. Critical JWT Vulnerability: Refresh Tokens Never Invalidate, Enabling Session Hijacking

A critical security flaw has been identified in a JWT implementation where refresh tokens are never invalidated after use. This creates a token replay vulnerability, allowing a single compromised refresh token to be reused indefinitely to generate new access tokens. The bug effectively grants an attacker permanent acce...

The Lab · 2026-04-18 21:22:32 · GitHub Issues

6. Critical JWT Vulnerability: Refresh Tokens Never Invalidate, Enabling Session Hijacking

A critical security flaw has been identified in a JWT implementation where refresh tokens are never invalidated after use. This creates a severe token replay vulnerability, allowing a single compromised refresh token to be reused indefinitely to generate new access tokens. The bug effectively grants an attacker permane...

The Vault · 2026-04-26 23:54:22 · GitHub Issues

7. Refresh Token Rotation Gap Allows Session Hijacking via Replay Attack

A critical authentication vulnerability has been identified in the refresh token implementation. The system's token rotation mechanism fails to detect when a refresh token has already been reused, creating a window where a stolen token could be weaponized to maintain unauthorized access to a legitimate user's session. ...

The Lab · 2026-04-27 10:54:11 · GitHub Issues

8. Critical Refresh Token Rotation Flaw Allows Token Reuse After Legitimate Rotation

A critical security vulnerability in the `POST /auth/refresh` endpoint fails to invalidate refresh tokens after rotation, allowing intercepted tokens to remain functional even after legitimate users have already rotated them. The flaw undermines the fundamental security guarantee of refresh token rotation—a mechanism d...

The Lab · 2026-05-04 18:54:12 · GitHub Issues

9. Hardcoded Django Secret Key in Calculator Project Exposes Sessions to Hijacking Risk

A critical security vulnerability has been identified in the `calculator` project's Django configuration, with a hardcoded SECRET_KEY directly embedded in the `settings.py` file. The flaw, mapped to CWE-798 (Use of Hard-coded Credentials), undermines cryptographic signing mechanisms protecting session cookies and passw...