Home / Vulnerability Database / Config files : Cookie: not HttpOnly
Config files
Config files : Cookie: not HttpOnly
Classification
OWASP Top 10 2013
OWASP Mobile Top 10 2016
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
HIPAA
CWE/SANS Top 25 2011
CWE/SANS Top 25 2021
Overview
The application uses cookies without the property HttpOnly set to true. HttpOnly ensures that cookies are only transferred over HTTP. It protects them from being stolen via JavaScript-code (XSS).
Sensitive Data Exposure vulnerabilities take the third place in the “OWASP Top 10 2017” web-application vulnerabilities ranking.
References
- The ultimate guide to secure cookies with web.config in .NET
- Securing Session INI Settings - php.net
- OWASP Top 10 2017 A2-Broken Authentication
- OWASP Top 10 2013-A5-Security Misconfiguration
- Origin Cookies: Session Integrity for Web Applications (pdf)
- CWE-1004
- CWE CATEGORY: OWASP Top Ten 2017 Category A2 - Broken Authentication
LOW
DerScanner Severity Score
Do you want to fix Config files : Cookie: not HttpOnly in your application?
See also
Config files
Config files : Text4Shell Vulnerability
Config files
Config files : Incorrect directory deletion
Config files
