The session cookie does not have HttpOnly flag set, so a malicious script could use it to forge a XSS attack. This isn't a direct security issue, as jenkins prevent arbitrary script to be included, just would offer a a second line of defense in case another security issue is detected.
- duplicates
-
JENKINS-27277 ACEGI_SECURITY_HASHED_REMEMBER_ME_COOKIE cookie no HttpOnly flag
-
- Resolved
-
[JENKINS-24840] Session cookie not set with HttpOnly flag
Labels | New: security |
Workflow | Original: JNJira [ 158070 ] | New: JNJira + In-Review [ 179720 ] |
Link |
New:
This issue duplicates |
Resolution | New: Duplicate [ 3 ] | |
Status | Original: Open [ 1 ] | New: Resolved [ 5 ] |