Skip to content

Session Cookie without Secure and HTTPOnly flags

Moderate
jrobinAV published GHSA-r3jq-4r5c-j9hp Aug 27, 2024

Package

No package listed

Affected versions

<= 3.1.1

Patched versions

None

Description

Summary

Session cookie is without Secure and HTTPOnly flags.

Details

Please take a look at this part of code (PoC screenshot) or check code directly (provided in Occurrences section below)

Occurrences:
https://github.com/Avaiga/taipy/blob/develop/frontend/taipy-gui/src/components/Taipy/Navigate.tsx#L67

Proposed remediation: add Secure and HTTPOnly flags for cookies.

It could be like this:
document.cookie = tprh=${tprh};path=/;Secure;HttpOnly;;

PoC

Screenshot:
image

Impact

Secure: This flag indicates that the cookie should only be sent over secure HTTPS connections. Without this flag, the cookie will be sent over both HTTP and HTTPS connections, which could expose it to interception or tampering if the connection is not secure.
HttpOnly: This flag prevents the cookie from being accessed by client-side JavaScript. It helps mitigate certain types of attacks, such as cross-site scripting (XSS), by preventing malicious scripts from accessing the cookie's value.

References
CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute https://cwe.mitre.org/data/definitions/614.html
CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag - https://cwe.mitre.org/data/definitions/1004.html
OWASP - Secure Cookie Attribute - https://owasp.org/www-community/controls/SecureCookieAttribute
Cookie security flags - https://www.invicti.com/learn/cookie-security-flags/
Cookie lack Secure flag - https://support.detectify.com/support/solutions/articles/48001048982-cookie-lack-secure-flag

Other:
Title: Encrypting the Web
URL: https://www.eff.org/encrypt-the-web

Update (Required advisory information) - added severity, resource:
https://portswigger.net/kb/issues/00500200_tls-cookie-without-secure-flag-set

Best regards,

Severity

Moderate

CVE ID

No known CVE

Credits