SiteShadow
Back to vulnerability library

SCP04 Session Management

What this means

SiteShadow flagged session handling patterns that can enable hijacking, fixation, or unintended persistence (missing cookie flags, long-lived sessions, weak rotation, sessions not invalidated on logout).

Why it matters

Weak session handling leads to hijacking or fixation.

Safer examples

1) Use secure cookie attributes

Set HttpOnly, Secure, and SameSite for session cookies (see CWE-614 / S02).

2) Rotate session IDs on privilege changes

Rotate on login and after step-up auth; invalidate older sessions.

3) Keep sessions short-lived and revocable

Use idle + absolute timeouts; provide server-side revocation for logout and password changes.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage