We have a web application running on Laravel 5.4. We have given this Website to an auditing service to check the vulnerabilities. Their report says that There is threat of Session Hijacking
. In the report, They have mentioned below threat.
THREAT: Suppose there are Two users A
and B
- Log into the account of
A
and copy thesession id
andXSRF-TOKEN
cookies of the user. - Now open another browser chrome, Login to the account of
B
. - Now paste the Cookies of
A
(session id
andXSRF-TOKEN
) in place of cookies ofB
(session id
andXSRF-TOKEN
). - Now just reload the chrome. That's it. Immediately, user
A
account will be opened.
I have tried it and they are correct. But, how to fix the issue? They recommended me to Turn on HttpOnly
and Secure
cookies with SSL encrypted, which I did.
Even after doing that, the issue is still there. Am I checking in the correct way? How to check the session hijacking vulnerability after setting HttpOnly
and Secure
?