nuclei-templates/http/misconfiguration/cookies-without-httponly-se...

45 lines
1.3 KiB
YAML
Raw Normal View History

id: cookies-without-httponly-secure
2024-01-03 11:38:30 +00:00
info:
name: Cookies without HttpOnly or Secure attribute - Detect
2024-01-04 06:15:10 +00:00
author: princechaddha,Mr.Bobo HP
2024-01-03 11:38:30 +00:00
severity: info
description: |
Checks whether cookies in the HTTP response contain the HttpOnly attribute. If the HttpOnly flag is set, it means that the cookie is HTTP-only
impact: |
Lack of HttpOnly flag on cookies increases the risk of client-side attacks, compromising user session security and data privacy.
remediation: |
Ensure that all cookies are set with the HttpOnly attribute to prevent client-side access.
reference:
- https://owasp.org/www-community/HttpOnly
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
metadata:
verified: true
max-request: 1
tags: misconfig,http,cookie,generic
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: header
words:
- 'Set-Cookie'
- type: word
part: header
words:
- "HttpOnly"
2024-01-12 06:28:48 +00:00
- "Secure"
2024-01-03 11:38:30 +00:00
negative: true
2024-01-12 06:28:48 +00:00
# digest: 4a0a0047304502202281b805f70fb2c8abd8e78dbfe4b3b04315f29e004b1a92e7e0a7e817ac3e8c022100bf2d8d994b7b0f9b08b077bf00aa99f8c509f75003705d4b5f0381117f236395:922c64590222798bb761d5b6d8e72950