logoalt Hacker News

notnullorvoidlast Thursday at 11:38 PM3 repliesview on HN

In general if a script can run, users sessions and more importantly passwords are at risk.

It's true that an HTTP-only session cookie couldn't be directly taken, but it's trivial to present the user with a login screen and collect their password (and OTP), at which point you can easily get a session remotely. It can look entirely like the regular login page right down to the url path (because the script can modify that without causing a page load).


Replies

socketclusteryesterday at 8:26 AM

Yep, httpOnly cookies just give the hacker a bit of extra work in some situations. TBH I don't even think httpOnly is worth the hassle it creates for platform developers given how little security it adds.

drewvlazyesterday at 12:03 AM

Wow did not realize a url could be set like that without promoting a page reload...

show 2 replies
jonfwyesterday at 1:21 AM

How do you modify the url exactly?

show 2 replies