Last night a customer called, frantic, because Google had cached versions of private employee information. The information is not available unless you login.
They had do
You asked for thoughts, so I'll give some. No warranty expressed or implied.
Give up the idea that your site is configured not to encode session information in URIs. With very high probability it did so. Either you're wrong about the configuration or (more likely) there's a bug that caused it to do so.
That leaves the central question: how Google obtained the session URI?
You didn't say anything about the customer base. Here's a guess:
A customer logged into the system in a way that produced a URI encoding of the session, then emailed this using a gmail account to someone else. Google scanned the email and provided the URI to the crawler bot.
There are other, similar ways that a customer whose client produced the URI could inadvertently surrender it to Google. Google Drive document. Google Plus posting. Etc.
Google may not be evil, but they're nonetheless everywhere. Their use agreement lets them move links across product boundaries, in this case mail (etc.) to search.
The real question you should be thinking about is why your site is not protected from cross-site request forgery. The Rails folks explain this pretty nicely. The Rails protect_from_forgery
mechanism would have prevented the reported problem.
A related question is why the encoded cookie (apparently) never expires. It ought to be easy to make sessions contain timestamps to make this so.