CAPEC-61 : Session Fixation
The attacker induces a client to establish a session with the target software using a session identifier provided by the attacker. Once the user successfully authenticates to the target software, the attacker uses the (now privileged) session identifier in their own transactions. This attack leverages the fact that the target software either relies on client-generated session identifiers or maintains the same session identifiers after privilege elevation.
https://capec.mitre.org/data/definitions/61.htmlRelated CWE definitions
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
The product does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use, and release.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Please note that CAPEC definitions are provided as a quick reference only.
Visit http://capec.mitre.org/ for a complete list of CAPEC entries
and more information.