improving cookie security #11
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Hi Michael,
We have a free program analysis tool for Python based web projects, called Bento. While we were scanning GitHub projects for issues, it triggered a warning for cookie security best practices for your app.
The cookie based authentication may be susceptible to XSS attacks (https://techblog.topdesk.com/security/cookie-security/). Flask recommendation is to set the
secure
,httponly
andsamesite
parameters (https://flask.palletsprojects.com/en/1.1.x/security/#set-cookie-options). Hopefully you'll find this PR useful.Bento found some additional issues related to the use of "bare excepts", and unsafe XML parser usage "xml.etree.ElementTree.fromstring" among other things. But I didn't include them to keep this PR simple. In case you are curious, you can take a look at them using bento (download it from https://bento.dev)