PHP : Cookie disabled
Classification
Overview
The application does not use cookies to transmit session identifiers. This allows attacks such as “session hijacking” and “session fixation”.
Most web applications use session IDs, which are transferred between client and server via cookies. Applications that do not store session IDs in cookies often transfer them as a HTTP-request parameter or as a part of the URL. Web servers, application servers, and proxy servers often store requested URLs in a log file. The more sources contain session identifiers, the greater the risk of them being compromised.
In the given case the value of session.use_cookies or of session.use_only_cookies is equal to 0 or off.
Sensitive Data Exposure vulnerabilities take the third place in the “OWASP Top 10 2017” web-application vulnerabilities ranking.
