Home / Vulnerability Database / Java : Cookie: reliance without validation
Java
Java : Cookie: reliance without validation
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0
HIPAA
CWE/SANS Top 25 2011
Overview
The program’s control flow relies on the values obtained from the cookie. There is no guarantee that the cookies belong to the current user or that they have not been modified.
Attackers can easily modify cookies, within the browser or by implementing the client-side code outside of the browser. Attackers can bypass protection mechanisms such as authorization and authentication by modifying the cookie to contain an expected value.
LOW
DerScanner Severity Score
Do you want to fix Java : Cookie: reliance without validation in your application?
See also
Java
Java : Race condition
Java
Java : Text4Shell Vulnerability
Java
