We have a web application running on Laravel 5.4. We have given this Website to an auditing service to check the vulnerabilities. Their report says that There is threat of Session Hijacking. In the report, They have mentioned below threat.
THREAT: Suppose there are Two users A and B
- Log into the account of Aand copy thesession idandXSRF-TOKENcookies of the user.
- Now open another browser chrome, Login to the account of B.
- Now paste the Cookies of A(session idandXSRF-TOKEN) in place of cookies ofB(session idandXSRF-TOKEN).
- Now just reload the chrome. That's it. Immediately, user Aaccount will be opened.
I have tried it and they are correct. But, how to fix the issue? They recommended me to Turn on HttpOnly and Secure cookies with SSL encrypted, which I did. 
Even after doing that, the issue is still there. Am I checking in the correct way? How to check the session hijacking vulnerability after setting HttpOnly and Secure? 
