Vulnerability Name: Improper Session Management
- Vulnerable Point:
https://amritdemo.piramalswasthya.org/identity-0.0.1/rmnch/syncDataToAmrit - Observation / Description: Improper session handling occurs when the user is able to access the content which he/she is not intended to access at the client side.
- Impact: If by any means an unauthorized user gets the URL for sensitive content, he/she can then access the sensitive content without any legit session of that application.
- Recommendation: To handle sessions properly, ensure that web app code creates, maintains, and destroys session tokens properly over the life-cycle of a user's web app session.
- Recommendation Solution: Along with 'Authorization Token' a 'Refresh Token' is required
- relates to
-
AMM-1202 FLW: Refresh token in User Authenticate API
-
- Ready for Development
-