$20,000 Bounty: How a Leaked Session Cookie Led to an Account Takeover
Karthikeyan Nagaraj
Penetration Tester | Secured NASA, Oxford, Drexel, and 15+ Government Organisations | Co-Lead Defcon Local Chapter | Speaker
Introduction: The Risk of Leaked Session Cookies
Session cookies play a critical role in user authentication, allowing users to stay logged in without re-entering credentials. However, if a session cookie is leaked, an attacker can hijack the session and gain full access to the account — a vulnerability known as session hijacking.
In this case, a Security Analyst accidentally leaked their own active session cookie while responding to a bug bounty report. This allowed a hacker to access their account, exposing sensitive reports and program data.
This security lapse resulted in a $20,000 bug bounty payout and led to several security improvements. Let’s dive into how this attack happened and how to prevent similar incidents.
1?? What is Session Hijacking?
Session hijacking occurs when an attacker steals an active session cookie and reuses it to gain access to an authenticated session without needing login credentials.
?? How session cookies work:
2?? How the Security Analyst Leaked Their Session Cookie
?? The Mistake: