Home / Vulnerability Database / Kotlin : Cookie: reliance without validation
Kotlin
Kotlin : Cookie: reliance without validation
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0
HIPAA
CWE/SANS Top 25 2011
Overview
The program’s control flow relies on the values obtained from the cookie. There is no guarantee that the cookies belong to the current user or that they have not been modified.
Attackers can easily modify cookies, within the browser or by implementing the client-side code outside of the browser. Attackers can bypass protection mechanisms such as authorization and authentication by modifying the cookie to contain an expected value.
LOW
DerScanner Severity Score
Do you want to fix Kotlin : Cookie: reliance without validation in your application?
See also
Kotlin
Kotlin : Missing required cryptographic step
Kotlin
Kotlin : Logging into system output
Kotlin
