Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-r3jq-4r5c-j9hp: Taipy has a Session Cookie without Secure and HTTPOnly flags

Summary

Session cookie is without Secure and HTTPOnly flags.

Details

Please take a look at this part of code (PoC screenshot) or check code directly (provided in Occurrences section below)

Occurrences: https://github.com/Avaiga/taipy/blob/develop/frontend/taipy-gui/src/components/Taipy/Navigate.tsx#L67

Proposed remediation: add Secure and HTTPOnly flags for cookies.

It could be like this: document.cookie = tprh=${tprh};path=/;Secure;HttpOnly;;

PoC

Screenshot: image

Impact

Secure: This flag indicates that the cookie should only be sent over secure HTTPS connections. Without this flag, the cookie will be sent over both HTTP and HTTPS connections, which could expose it to interception or tampering if the connection is not secure. HttpOnly: This flag prevents the cookie from being accessed by client-side JavaScript. It helps mitigate certain types of attacks, such as cross-site scripting (XSS), by preventing malicious scripts from accessing the cookie’s value.

References CWE-614: Sensitive Cookie in HTTPS Session Without ‘Secure’ Attribute https://cwe.mitre.org/data/definitions/614.html CWE-1004: Sensitive Cookie Without ‘HttpOnly’ Flag - https://cwe.mitre.org/data/definitions/1004.html OWASP - Secure Cookie Attribute - https://owasp.org/www-community/controls/SecureCookieAttribute Cookie security flags - https://www.invicti.com/learn/cookie-security-flags/ Cookie lack Secure flag - https://support.detectify.com/support/solutions/articles/48001048982-cookie-lack-secure-flag

Other: Title: Encrypting the Web URL: https://www.eff.org/encrypt-the-web

Update (Required advisory information) - added severity, resource: https://portswigger.net/kb/issues/00500200_tls-cookie-without-secure-flag-set

Best regards,

ghsa
#xss#web#git#java#ssl

Summary

Session cookie is without Secure and HTTPOnly flags.

Details

Please take a look at this part of code (PoC screenshot) or check code directly (provided in Occurrences section below)

Occurrences:
https://github.com/Avaiga/taipy/blob/develop/frontend/taipy-gui/src/components/Taipy/Navigate.tsx#L67

Proposed remediation: add Secure and HTTPOnly flags for cookies.

It could be like this:
document.cookie = tprh=${tprh};path=/;Secure;HttpOnly;;

PoC

Screenshot:

Impact

Secure: This flag indicates that the cookie should only be sent over secure HTTPS connections. Without this flag, the cookie will be sent over both HTTP and HTTPS connections, which could expose it to interception or tampering if the connection is not secure.
HttpOnly: This flag prevents the cookie from being accessed by client-side JavaScript. It helps mitigate certain types of attacks, such as cross-site scripting (XSS), by preventing malicious scripts from accessing the cookie’s value.

References
CWE-614: Sensitive Cookie in HTTPS Session Without ‘Secure’ Attribute https://cwe.mitre.org/data/definitions/614.html
CWE-1004: Sensitive Cookie Without ‘HttpOnly’ Flag - https://cwe.mitre.org/data/definitions/1004.html
OWASP - Secure Cookie Attribute - https://owasp.org/www-community/controls/SecureCookieAttribute
Cookie security flags - https://www.invicti.com/learn/cookie-security-flags/
Cookie lack Secure flag - https://support.detectify.com/support/solutions/articles/48001048982-cookie-lack-secure-flag

Other:
Title: Encrypting the Web
URL: https://www.eff.org/encrypt-the-web

Update (Required advisory information) - added severity, resource:
https://portswigger.net/kb/issues/00500200_tls-cookie-without-secure-flag-set

Best regards,

References

  • GHSA-r3jq-4r5c-j9hp
  • https://github.com/Avaiga/taipy/blob/develop/frontend/taipy-gui/src/components/Taipy/Navigate.tsx#L67

ghsa: Latest News

GHSA-pxg6-pf52-xh8x: cookie accepts cookie name, path, and domain with out of bounds characters