1
 min read

Cookie Poisoning

A cookie poisoning attack and becomes exploitable when an attacker can manipulate the cookie in various ways.

Summary

This check looks at user-supplied input in query string parameters and POST data to identify where cookie parameters might be controlled. This is called a cookie poisoning attack and becomes exploitable when an attacker can manipulate the cookie in various ways. In some cases, this will not be exploitable, however, allowing URL parameters to set cookie values is generally considered a bug.

Solution

Do not allow user input to control cookie names and values. If some query string parameters must be set in cookie values, be sure to filter out semicolons that can serve as name/value pair delimiters.

References

Scan and protect your web application from hackers

Run our automated penetration testing and vulnerability assessment to protect your web application from hackers.

Thank you for registering
Oops! Something went wrong.