"SESSION" Cookie without HttpOnly flag set

Disclosed: 2014-05-11 08:17:54 By ashesh To irccloud
Unknown
Vulnerability Details
Vulnerability description This cookie does not have the HTTPOnly flag set. When a cookie is set with the HTTPOnly flag, it instructs the browser that the cookie can only be accessed by the server and not by client-side scripts. This is an important security protection for session cookies. This vulnerability affects /. Discovered by: Crawler. Attack details Cookie name: "session" Cookie domain: "www.irccloud.com" View HTTP headers Request GET / HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: session=4.6b060b7018904911e5665ffc9685a5a3 Host: www.irccloud.com Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36 Accept: */* Response HTTP/1.1 200 OK X-Frame-Options: SAMEORIGIN X-UA-Compatible: chrome=1 Strict-Transport-Security: max-age=31536000 server: Cowboy date: Fri, 11 Apr 2014 04:24:23 GMT content-length: 80485 content-type: text/html; charset=UTF-8 cache-control: no-cache, must-revalidate, max-age=0, no-store pragma: no-cache expires: 0 Original-Content-Encoding: gzip The impact of this vulnerability An attacker can hijack session of victim How to fix this vulnerability You should set the HTTPOnly flag for this cookie.
Actions
View on HackerOne
Report Stats
  • Report ID: 7033
  • State: Closed
  • Substate: informative
  • Upvotes: 3
Share this report