Home / Vulnerability Database / JavaScript : Cookie: not HttpOnly
JavaScript
JavaScript : Cookie: not HttpOnly
Classification
OWASP Top 10 2013
OWASP Mobile Top 10 2016
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
HIPAA
CWE/SANS Top 25 2011
CWE/SANS Top 25 2021
Overview
The application creates cookies without setting the httpOnly flag to true. If the httpOnly flag is included in the HTTP response header, the cookie cannot be accessed through client side script. As a result, even if a cross-site scripting (XSS) flaw exists, and a user accidentally accesses a link that exploits this flaw, the browser will not reveal the cookie to a third party. If the httpOnly flag isn’t included in the HTTP response header, the cookie (typically your session cookie) becomes vulnerable to theft of modification by malicious script.
Sensitive Data Exposure vulnerabilities take the third place in the “OWASP Top 10 2017” web-application vulnerabilities ranking.
MEDIUM
DerScanner Severity Score
Do you want to fix JavaScript : Cookie: not HttpOnly in your application?
See also
JavaScript
JavaScript : Null salt
JavaScript
JavaScript : Empty encryption key
JavaScript
