Session fixation occurs when an application authenticates a user without first destroying the previous session ID. This allows an attacker who knows that session identifier to hijack the user's authenticated session.
This vulnerability typically happens in three scenarios: when an app authenticates a user while keeping their old session active, when an attacker can force a user to use a known session identifier, or when the application uses predictable session IDs that are easy to guess. Essentially, the system fails to issue a fresh, secure session token upon login, leaving the door open for session theft. In a common attack, the attacker first creates a session on the target application and notes its identifier. They then trick or redirect the victim into using that same session ID, often before the victim logs in. Once the victim authenticates, the attacker can use the known identifier to access the now-privileged session, effectively taking over the user's account without needing their credentials.
Impact: Gain Privileges or Assume Identity
Strategy: Firewall
Effectiveness: Moderate
javahtml