nuclei-templates/http/misconfiguration/cookies-without-secure.yaml

43 lines
1.3 KiB
YAML

id: cookies-without-secure
info:
name: Cookies without Secure attribute - Detect
author: vthiery
severity: info
description: |
Checks whether cookies in the HTTP response contain the Secure attribute. If the Secure flag is set, it means that the cookie can only be transmitted over HTTPS
impact: |
Lack of Secure flag on cookies allows the cookie to be sent over unsecure HTTP, making it vulnerable to man-in-the-middle (MITM) attacks.
remediation: |
Ensure that all cookies are set with the Secure attribute to prevent MITM attacks.
reference:
- https://owasp.org/www-community/controls/SecureCookieAttribute
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
metadata:
verified: true
max-request: 1
tags: misconfig,http,cookie,generic
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: header
words:
- 'Set-Cookie'
- type: word
part: header
case-insensitive: true
words:
- "Secure"
negative: true
# digest: 4a0a00473045022100fd0cc4c9e3ebd5d0d7d0fc29965d22239c1da8cc88acbb62747326788e3e494402204db18487eee768dafbf8cf2ca56f74976c5a3d66ea73d730dd23d62b65469a0b:922c64590222798bb761d5b6d8e72950