Home / Vulnerability Database / Ruby : Cookie: not HttpOnly
Ruby
Ruby : Cookie: not HttpOnly
Classification
OWASP Top 10 2013
OWASP Mobile Top 10 2016
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
HIPAA
CWE/SANS Top 25 2011
CWE/SANS Top 25 2021
Overview
The application creates cookies without setting the httpOnly flag to true. If the httpOnly flag is included in the HTTP response header, the cookie cannot be accessed through client side script. As a result, even if a cross-site scripting (XSS) flaw exists, and a user accidentally accesses a link that exploits this flaw, the browser will not reveal the cookie to a third party. If the httpOnly flag isn’t included in the HTTP response header, the cookie (typically your session cookie) becomes vulnerable to theft of modification by malicious script.
Sensitive Data Exposure vulnerabilities take the third place in the “OWASP Top 10 2017” web-application vulnerabilities ranking.
MEDIUM
DerScanner Severity Score
Do you want to fix Ruby : Cookie: not HttpOnly in your application?
See also
Ruby
Ruby : Weak hashing algorithm
Ruby
Ruby : Empty encryption key
Ruby
