I'm a little worried that no one has listed these 2 attacks:
1) Session Fixing A hacker displays your website and receives one of these session URLs. He then sends a lot of fake emails to potential users so that they appear as if they were coming from your site. An email is requested in the email and the attacker is given the session URL. The attacker then periodically checks the session URL to verify that someone is authenticated. If they are, then the attack succeeded, and the hacker simply stole the account. To fix this problem is to save the user's IP address in the session variable during creation and check it for each request. If you transfer only the session identifier via Cookie, the attacker cannot set the cookie value in another browser for a domain that he does not control, therefore this attack cannot be performed.
2) Printer : Sometimes people print a page from a website. Do you ever look at the very bottom of a page printed from a website? Well, usually the URL on the page. If you print the page and then pass it on to someone, you simply write down your username / password and pass them on to them.
Avoid session urls at all costs.
Use SSL for the entire session. If you do not, you will skip the session ID (this is true if you use a cookie!). This use of ssl is a clear requirement of the OWASP Top 10 Best in 2010 OUASP A3 “Authentication and Session Management Violation”.
source share