Session cookie can be leaked over an unencrypted HTTP connection
Unknown
Vulnerability Details
Because the session cookie, `session`, does not have the [Secure flag](https://www.owasp.org/index.php/SecureFlag) set, it is possible that the session cookie leaks over an unencrypted connection. An attacker could exploit this issue by (for example) tricking a user into clicking on a link to a page with the following HTML code:
<img src="http://www.irccloud.com">
When the user visits the page, the browser will send a request to www.irccloud.com, over an unencrypted connection (note the **http** instead of **https**), containing the session cookie. When this happens, an attacker can easily take over the user's session with a *Man-In-The-Middle attack*.
I recommend setting the Secure flag, so browsers who support the Secure flag will prevent the transmission of a cookie in an unencrypted HTTP packet.
Actions
View on HackerOneReport Stats
- Report ID: 6927
- State: Closed
- Substate: resolved
- Upvotes: 1