Session cookie not set with HttpOnly flag

This issue is archived. You can view it, but you can't modify it. Learn more

XMLWordPrintable

      The session cookie does not have HttpOnly flag set, so a malicious script could use it to forge a XSS attack. This isn't a direct security issue, as jenkins prevent arbitrary script to be included, just would offer a a second line of defense in case another security issue is detected.

            Assignee:
            Unassigned
            Reporter:
            Nicolas De Loof
            Archiver:
            Jenkins Service Account

              Created:
              Updated:
              Resolved:
              Archived: