Practical Demonstration of Session Fixation Authentication Bypass Vulnerability in WebGoat Web Application.

Once we have the following window open, we proceed to type a SID to steal the victim's session.

Click on "Send Mail".

On this screen, the username and password are provided. We will enter them into the login and proceed to the next window.

When the victim has logged in with their credentials, the attacker proceeds to fix the victim's session. To do this, we must click on the link.

The link takes us to the victim's bank login. The attacker must type the SID that we added in the first screen into the URL to fix the session.

Once the session is fixed, we will have access to the victim's bank.

  

Locating PHP Session Management Configuration Parameters to Mitigate Potential Attack Success.

Below are screenshots of the `php.ini` configuration:

References