Home / Vulnerability Database / PHP : Cookie disabled
PHP

PHP : Cookie disabled

Overview

The application does not use cookies to transmit session identifiers. This allows attacks such as “session hijacking” and “session fixation”.

Most web applications use session IDs, which are transferred between client and server via cookies. Applications that do not store session IDs in cookies often transfer them as a HTTP-request parameter or as a part of the URL. Web servers, application servers, and proxy servers often store requested URLs in a log file. The more sources contain session identifiers, the greater the risk of them being compromised.

In the given case the value of session.use_cookies or of session.use_only_cookies is equal to 0 or off.

Sensitive Data Exposure vulnerabilities take the third place in the “OWASP Top 10 2017” web-application vulnerabilities ranking.

MEDIUM

DerScanner Severity Score

Do you want to fix PHP : Cookie disabled in your application?

See also

PHP

PHP : Null salt

PHP

PHP : Empty password

PHP

PHP : Empty salt