Session Fixation Attack on HTTP Cookies

This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.

Synopsis :

The remote web application is vulnerable to a session fixation

Description :

By manipulating cookies through a vulnerability similar to cross-site
scripting, an attacker can set the session cookies. The legitimate
user will be logged out of the application and after he logs in again,
the cookie will remain unchanged and the attacker will be able to
steal the open session and impersonate the user.

See also :

Solution :

- Fix the application so that the session cookie is re-generated
after a successful authentication.

- Fix the cookie manipulation flaws.

Risk factor :

High / CVSS Base Score : 7.5

Family: Web Servers

Nessus Plugin ID: 45084 (http_session_fixation.nasl)

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now