Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix insecure session cookie initialization #1656

Merged
merged 1 commit into from
Sep 28, 2017
Merged

Fix insecure session cookie initialization #1656

merged 1 commit into from
Sep 28, 2017

Conversation

newbthenewbd
Copy link
Contributor

While, as pull request #1634 has proven, it's not the best idea around to get rid of the duplicate session cookie, I still consider it a good idea to ensure that the initial cookie has properly configured security. Doing so not only prevents the so-far-distant scenario where a poor JavaScript interpreter programmer mastermind visionaire makes the Set-Cookie HTTP headers visible to JavaScript unless they're set to HTTP only (or, worse yet, makes the Set-Cookie headers get processed alongside JavaScript, effectively making Grav suspectible to a while loop checking document.cookie), but also the imminent spread of FUD (which is probably happening yet behind our backs, see the first Google result for "Web Server Security Test", especially the grading penalty it gives for "missing secure flags or attributes" on cookies) once website security checkers figure out that there are insecure sessions and pass that information to users.

@rhukster rhukster merged commit a861d57 into getgrav:develop Sep 28, 2017
@rhukster
Copy link
Member

tested and seemed to work just fine.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants