What you have done here may slightly improve the overall security of the solution, but it does not necessarily prevent session hijacking.
The security problem when placing the session ID in the URL is that the URLs are displayed in different places (for example, copies and pasted URLs can expose a live session, URLs can be stored in proxy logs, web logs -servers and browser history), which can allow an attacker to capture a valid session identifier and gain access to your user data.
Ideally, you should remove the JSESSIONID from the URL in all places and use the cookie store.
In addition, if you want to smooth out session capture, a number of other areas will be covered there.
SSL , ( , (, Firesheep).
, , .
, , cookie HTTPOnly , .
OWASP
, , Security.stackexchange.com