My Oracle Support Banner

Man In The Middle Attack Using SSO Cookie (Doc ID 377977.1)

Last updated on MAY 01, 2023

Applies to:

Oracle Application Server Single Sign-On - Version 10.1.2.0.2 to 10.1.4.3 [Release 10gR2 to 10gR3]
Information in this document applies to any platform.

Goal

Is there a possibility of a 'man in the middle' attack using the SSO cookie?

I have been asked if it is possible to copy the SSO cookie value from an existing authenticated browser session and then copy it into another browser session and effectively 'replay' the SSO authentication.

Is this possible?Assuming that it is not, what is the mechanism that differentiates between the browser sessions and protects against this type of attack?

Solution

To view full details, sign in with your My Oracle Support account.

Don't have a My Oracle Support account? Click to get started!


In this Document
Goal
Solution


My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.