Virtual War (aka VWar) 1.6.1 R2 uses static session cookies that depend only on a user's password, which makes it easier for remote attackers to bypass timeout and logout actions, and retain access for a long period of time, by leveraging knowledge of a session cookie.
Weaknesses in this category are related to the management of credentials.
Link | Tags |
---|---|
http://dmcdonald.net/vwar.txt | exploit |
http://seclists.org/fulldisclosure/2010/Aug/235 | mailing list exploit |