Suppose you have a webapp that gives users their own site on a subdomain (eg: awesome.super-cms.com) and that you let them edit HTML. Further assume that you're setting the SessionID in a wildcard subdomain cookie ("*.super-cms.com")
The user who manages evil.super-cms.com could easily write a JavaScript that grabs the SessionID from other super-cms.com users:
var session = $.cookie('SessionID');
// Now send `session` to evil.com
My question is: Could an attacker user these harvested SessionIDs to do bad things? For example, spoof authentication as another user?
(I realize this is a pretty newb question. I'm afraid I don't know enough about the internals of sessions to confidently answer this question myself. Please feel free to link to any reading material that might aid my understanding.)