Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 26 Jun 2014 21:53:01 +0400
From: Vladimir '3APA3A' Dubrovin <vlad@...urityvulns.ru>
To: oss-security@...ts.openwall.com, vdanen@...hat.com
CC: cve-assign@...re.org
Subject: Re: Re: Question regarding CVE applicability of missing
 HttpOnly flag



At least sharing session with Flash application may require Javascript 
access to session cookies. It can be worked out in most cases, but it's 
not so simple as
"just make all session cookies HTTPOnly".

Kurt Seifried пишет:
> So with widespread XSS in mind, I think it's safe to say that
> virtually every web site (even sites that care deeply and spend
> time/money and have bug bounties) have lurking XSS flaws, which if
> HTTPOnly is not used can result in cookie theft. So in my mind
> HTTPOnly isn't an option any more, but a requirement, ergo in most
> situations no HTTPOnly = win a CVE.
>
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.