Session Cookie without Secure flag set

Disclosed: 2014-05-21 17:47:15 By 0xsaikiran To automattic
Unknown
Vulnerability Details
vulnerability-Session Cookie without Secure flag set Vulnerability description This cookie does not have the Secure flag set. When a cookie is set with the Secure flag, it instructs the browser that the cookie can only be accessed over secure SSL channels. This is an important security protection for session cookies. This vulnerability affects /. Discovered by: Crawler. Attack details Cookie name: "wp_sharing_54117_10_twitter" Cookie domain: "automattic.com" View HTTP headers Request GET / HTTP/1.1 Host: automattic.com Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36 Accept: / Response HTTP/1.1 200 OK Server: nginx Date: Tue, 15 Apr 2014 15:53:40 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive Vary: Accept-Encoding Last-Modified: Tue, 15 Apr 2014 15:53:37 GMT Cache-Control: max-age=297, must-revalidate X-nananana: Batcache Vary: Cookie X-hacker: If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header. X-Pingback: http://automattic.com/xmlrpc.php Link: http://wp.me/Pe4R-am2; rel=shortlink Original-Content-Encoding: gzip Content-Length: 17919 How to fix this vulnerability If possible, you should set the Secure flag for this cookie
Actions
View on HackerOne
Report Stats
  • Report ID: 7843
  • State: Closed
  • Substate: informative
  • Upvotes: 1
Share this report