by Ramesh Lingappa
What is session hijacking and how you can stop it
This story is for beginners and anyone who has a basic understanding about cookies (sessions cookies), but who’s not sure how to secure them properly. You don’t have to be a security expert to do that. You just have to understand the process and then you will know.
If you don’t have any idea about cookies or how they work, then please read this article about HTTP Cookies.
Let's get to it! You have an amazing web application offering a great service for customers. That means you will have an Authentication mechanism to get the user to your application. You know how important security is. You implemented all sorts of security measures during authentication. Great!
Upon successful authentication, you must create a Session for that user. This means that you are actually creating a cookie and sending it back to the browser. For example, in a Java web app, by default, it’s called JSESSIONID. It looks something like this:
By using this cookie, only your web server is able to identify who the user is and it will provide content accordingly. And this cookie looks great. No sensitive information in the cookie, just the random ID (non-guessable). So the user is Safe! …right?
Well not exactly, let’s take a closer look.
There are two properties in this cookie: HttpOnly (HTTP) and Secure. Their values are blank, meaning not enabled for this cookie. That’s where it gets to the point that it’s no longer safe.
This is where Session Hijacking comes into play.
Session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session — sometimes also called a session key — to gain unauthorized access to information or services in a computer system. — Wikipedia
So it’s the act of stealing a customer’s session ID, by which they can access your web application as if they’re that customer.
Is this possible? How do they get that session ID which is in the user’s browser?
Yes it’s possible. The two cookie properties (or flags) which we saw earlier (HttpOnly and Secure) are the reason for this.
HttpOnlyflag should be set.
Open any web page whose cookie doesn’t have the httpOnly flag set. Then open Chrome Dev Console and then tap Console Tab (Cmd + Shift+ J or Ctrl + Shift+ J). Type
document.cookie and Enter, and you will see something like this:
You might wonder how they can write this code in your Application. It’s possible in several ways.
One way is to inject some untrusted third-party JS library like logging, helper utilities, etc. Read this article I’m harvesting credit card numbers and passwords from your site. Here’s how.
Another way is by using a Cross Site Scripting Attack. We are not going to get into the details of it, but remember it can be done.
So how do we fix it?
Set-Cookie: JSESSIONID=T8zK7hcII6iNgA; Expires=Wed, 21 May 2018 07:28:00 GMT; HttpOnly
Notice the tick mark in the HTTP property. That indicates that httpOnly is enabled.
Here you can see that document.cookie doesn’t return our session cookie. Meaning no JS can read it, including any external scripts.
That’s it — one down one to go!
The secure flag instructs the browser that the cookie should only be returned to the application over encrypted connections, that is, an HTTPS connection.
So, when a cookie is sent to the browser with the flag secure, and when you make a request to the application using HTTP, the browser won’t attach this cookie in the request. It will attach it only in an HTTPS request. The HTTPS request will be encrypted so cookies will be safely sent across the network to your application.
How can someone read the cookie in the HTTP request?
This can be achieved when someone (called a “Man in the Middle” attack) is monitoring all the traffic in the network of customers. They are able to see the clear text data if the request is in HTTP.
When it’s sent over HTTPS, all data will be encrypted from the browser and sent to the network. The attacker won’t be able to get the raw data you were sending. Nor will the attacker be able to decrypt the content. This is why sending Data over SSL is secure.
So how do we fix it?
Just like the httpOnly flag, you just need to add the secure flag in your set_cookie HTTP response header. Like this:
Set-Cookie: JSESSIONID=T8zK7hcII6iNgA; Expires=Wed, 21 May 2018 07:28:00 GMT; HttpOnly; Secure
In Java it can be done in several ways. If you are using Servlet 3.0 or above, then you can configure these settings in web.xml like this:
<session-config> <cookie-config> <http-only>true</http-only> <secure>true</secure> </cookie-config> </session-config>
If your environment doesn’t support it, then you can add it manually. For example using Servlets you can do this:
Finally, this is how it looks when both flags are set,
So when you are dealing with session cookies or any other important cookies, make sure you add these two flags.
Thanks for reading, Happy Securing!