Sensitive Cookie Without 'HttpOnly' Flag in azuracast/azuracast

Valid

Reported on

Aug 26th 2021


✍️ Description

HTTPOnly attribute is not set for session cookies in the application.

🕵️‍♂️ Proof of Concept

Cookie Without HTTPOnly Attribute

💥 Impact

When a cookie doesn’t have an HttpOnly flag, it can be accessed through JavaScript, which means that an XSS could lead to cookies being stolen. These include session cookies that can make it easier to achieve account/session takeover.

Occurences

Ziding Zhang
3 months ago

Admin


Hey Melbin, I've just emailed the repo's maintainers for you. Waiting to hear back, good job!

We have contacted a member of the azuracast team and are waiting to hear back 3 months ago
Buster "Silver Eagle" Neece validated this vulnerability 3 months ago
Melbin Mathew Antony has been awarded the disclosure bounty
The fix bounty is now up for grabs
Buster
3 months ago

Maintainer


This issue has now been fixed as of the latest Rolling Release version.

Buster "Silver Eagle" Neece confirmed that a fix has been merged on 95a9b8 3 months ago
Buster "Silver Eagle" Neece has been awarded the fix bounty