security-doc/security-notes/OSSN-0036
Luke Hinds 1bf55f1eb0 Added Authors to Security Notes
All OSSN authors, added under the "Author:" metadata field

Change-Id: I81771dd3ec8d2c133ebc6ddf9f2c5f0f958d603a
Closes-Bug: #1599064
2016-07-11 10:51:07 +00:00

31 lines
1.2 KiB
Plaintext

Horizon does not set Secure Attribute in cookies
---
### Summary ###
Horizon does not, by default, set the Secure Attribute in cookies.
### Affected Services / Software ###
Horizon, Django, SSL, TLS
### Discussion ###
When used in production, Horizon should have the Secure Attribute for
cookies set. When this flag is set, browsers will only transfer the
cookie over secure channels. Without it set, browsers may transfer the
cookie over plain-text channels, potentially exposing the contents to an
attacker who can then use the cookie to authenticate with the Horizon
server as the original user.
### Recommended Actions ###
Enable secure cookie by setting the SESSION_COOKIE_SECURE config flag to
true as described in the Django documentation:
https://docs.djangoproject.com/en/dev/ref/settings/#std:setting-SESSION_COOKIE_SECURE
### Contacts / References ###
Author: Robert Clark, HP
This OSSN : https://wiki.openstack.org/wiki/OSSN/OSSN-0036
Related OSSN : https://wiki.openstack.org/wiki/OSSN/OSSN-0035
Original LaunchPad Bug : https://bugs.launchpad.net/horizon/+bug/1191051
OpenStack Security ML : openstack-security@lists.openstack.org
OpenStack Security Group : https://launchpad.net/~openstack-ossg