Skip to content

Latest commit

 

History

History
26 lines (21 loc) · 1.13 KB

File metadata and controls

26 lines (21 loc) · 1.13 KB
name Cookie with SameSite attribute set to None
severity low
cvss-score 3.1
cvss-vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
cwe-id CWE-1275
cwe-name Sensitive Cookie with Improper SameSite Attribute
compliance
HIPAA ISO 27001 owasp10 pci PCI-DSS v4.0.1
164.306(a), 164.312(c)(1), 164.312(e)(1)
A.5.14, A.8.9, A.8.24, A.8.25
A2, A7
4.1, 6.5.4, 6.5.10
4.2.1, 6.2.4

We found a Set-Cookie header with the SameSite cookie attribute set to None. Although this is not a vulnerability by itself, the SameSite cookie attribute defines whether cookies are sent in cross-site requests. If properly configured, SameSite makes Cross-Site Request Forgery (CSRF) attacks impossible or very hard to perpetrate. If set to None, this protection is not enabled.

How to fix

{% tabs cookie-with-samesite-attribute-set-to-none %} {% tab cookie-with-samesite-attribute-set-to-none generic %} Set the SameSite cookie attribute to strict to mitigate CSRF attacks. If strict breaks any functionality, use lax instead, which gives you protection against POST-based CSRF, but not GET ones. {% endtab %}

{% endtabs %}