Skip to content

Commit a943706

Browse files
Elar Langelarlang
Elar Lang
authored andcommitted
#2421 - cookie samesite attribute
1 parent 3c84424 commit a943706

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

5.0/en/0x50-V50-Web-Frontend-Security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ To leverage the benefits of same-origin isolation, applications should be hosted
2424
| :---: | :--- | :---: | :---: | :---: | :---: |
2525
| **50.2.1** | [MODIFIED, MOVED FROM 3.4.1] Verify that cookies have the 'Secure' attribute set, and if the '\__Host-' prefix is not used for the cookie name, the '__Secure-' prefix must be used for the cookie name. |||| 614 |
2626
| **50.2.2** | [MODIFIED, MOVED FROM 3.4.2, LEVEL L1 > L2] Verify that if the value of a cookie is not meant to be accessible to client-side scripts (such as a session token), the cookie must have the 'HttpOnly' attribute set and the same value (e. g. session token) must only be transferred to the client via the 'Set-Cookie' header field. | ||| 1004 |
27-
| **50.2.3** | [MOVED FROM 3.4.3] Verify that cookie-based session tokens utilize the 'SameSite' attribute to limit exposure to cross-site request forgery attacks. | ||| 1275 |
27+
| **50.2.3** | [MODIFIED, MOVED FROM 3.4.3, LEVEL L1 > L2] Verify that each cookie's 'SameSite' attribute value is set according to the purpose of the cookie, to limit exposure to cross-site request forgery and user interface redress attacks. | ||| 1275 |
2828
| **50.2.4** | [MOVED FROM 3.4.4] Verify that cookie-based session tokens use the "__Host-" prefix so cookies are only sent to the host that initially set the cookie. |||| 16 |
2929

3030
## V50.3 Browser Security Mechanism Headers

0 commit comments

Comments
 (0)