Session Fixation Attack on HTTP Cookies

This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.

Synopsis :

The remote web application is vulnerable to a session fixation

Description :

By manipulating cookies through a vulnerability similar to cross-site
scripting, an attacker can set the session cookies. The legitimate
user will be logged out of the application and after he logs in again,
the cookie will remain unchanged and the attacker will be able to
steal the open session and impersonate the user.

See also :

Solution :

- Fix the application so that the session cookie is re-generated
after a successful authentication.

- Fix the cookie manipulation flaws.

Risk factor :

High / CVSS Base Score : 7.5

Family: Web Servers

Nessus Plugin ID: 45084 (http_session_fixation.nasl)

Bugtraq ID:


Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial