Session Cookie Without Secure Flag,
None
Vulnerability Details
Assigned to:-ED
Assigned by:- Kirtikumar Anandrao Ramchandani
Assigned on:- 25/04/2018
Bug overview:- Session Cookie without secure flag.
Cookie Name:- _gitlab_session
Description:-Risk description:
Since the Secure flag is not set on the cookie, the browser will send it over an unencrypted channel (plain HTTP) if such a request is made. Thus, the risk exists that an attacker will intercept the clear-text communication between the browser and the server and he will steal the cookie of the user. If this is a session cookie, the attacker could gain unauthorized access to the victim's web session.
Recommendation:I recommend reconfiguring the web server in order to set the flag(s) Secure to all sensitive cookies.
Reference:-https://blog.dareboost.com/en/2016/12/secure-cookies-secure-httponly-flags/.
## Impact
The secure flag is an option that can be set by the application server when sending a new cookie to the user within an HTTP Response. The purpose of the secure flag is to prevent cookies from being observed by unauthorized parties due to the transmission of a the cookie in clear text.
To accomplish this goal, browsers which support the secure flag will only send cookies with the secure flag when the request is going to a HTTPS page. Said in another way, the browser will not send a cookie with the secure flag set over an unencrypted HTTP request.
By setting the secure flag, the browser will prevent the transmission of a cookie over an unencrypted channel.
Actions
View on HackerOneReport Stats
- Report ID: 343095
- State: Closed
- Substate: informative
- Upvotes: 5