git-svn-id: http://webgoat.googlecode.com/svn/branches/webgoat-6.0@485 4033779f-a91e-0410-96ef-6bf7bf53c507
		
			
				
	
	
		
			26 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			HTML
		
	
	
	
	
	
			
		
		
	
	
			26 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			HTML
		
	
	
	
	
	
| <div align="Center">
 | |
| <p><b>Lesson Plan Title:</b> HttpOnly Test</p>
 | |
| </div>
 | |
| <p><b>Concept / Topic To Teach:</b></p>
 | |
| <!-- Start Instructions -->
 | |
| To help mitigate the cross site scripting threat, Microsoft has
 | |
| introduced a new cookie attribute entitled 'HttpOnly.' If this flag is
 | |
| set, then the browser should not allow client-side script to access the
 | |
| cookie. Since the attribute is relatively new, several browsers neglect
 | |
| to handle the new attribute properly.
 | |
| <p>For a list of supported browsers see: <a href=http://www.owasp.org/index.php/HTTPOnly#Browsers_Supporting_HTTPOnly>OWASP HTTPOnly Support</a>
 | |
| <p><b>General Goal(s):</b></p>
 | |
| The purpose of this lesson is to test whether your browser supports the
 | |
| HTTPOnly cookie flag. Note the value of the
 | |
| <strong>unique2u</strong>
 | |
| cookie. If your browser supports HTTPOnly, and you enable it for a
 | |
| cookie, client side code should NOT be able to read OR write to that
 | |
| cookie, but the browser can still send its value to the server. Some
 | |
| browsers only prevent client side read access, but don't prevent write
 | |
| access.
 | |
| <br />
 | |
| <br />
 | |
| With the HTTPOnly attribute turned on, type
 | |
| "javascript:alert(document.cookie)" in the browser address bar. Notice
 | |
| all cookies are displayed except the unique2u cookie.
 | |
| <!-- Stop Instructions --> |