Sensitive Cookie Without 'HttpOnly' Flag in glpi-project/glpi
Reported on
Aug 5th 2021
✍️ Description
According to [1] we have :
HttpOnly is an additional flag included in a Set-Cookie HTTP response header. Using the HttpOnly flag when generating a cookie helps mitigate the risk of client side script accessing the protected cookie
💥 Impact
This vulnerability is capable of take control of user's account.
[1] https://owasp.org/www-community/HttpOnly [2] https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#restrict_access_to_cookies 📍 Location index.php#L1
I just created a Github security advisory for this report. https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2
@amammad - I have changed the CWE to the requested 1004, and have updated the bounties as expected for the CWE type.