<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic [ASA5510] Cisco AnyConnect - Cookie not HTTP-Only in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159133#M360107</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the bugID for the above HTTP-Only cookie issue: &lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCth55933" target="_blank"&gt;CSCth55933&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId="&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=&lt;/A&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCth55933" target="_blank"&gt;CSCth55933&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls kindly check on the explaination on further description:&lt;/P&gt;&lt;P&gt;While this is not a false positive, any vulnerability would be in the&amp;nbsp; cross-site scripting attack and not in the lack of cookie protection&amp;nbsp; through the use of the HttpOnly flag. This bug documents the&amp;nbsp; investigation into cookie protection on the ASA. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 17 Mar 2013 21:30:29 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2013-03-17T21:30:29Z</dc:date>
    <item>
      <title>[ASA5510] Cisco AnyConnect - Cookie not HTTP-Only</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159132#M360106</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recently we had an external security scan and one of the things that was pointed out is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.5 Cookie not HTTP-Only&lt;BR /&gt; Targets: **.**.**.**&lt;BR /&gt; The web application sent a cookie that is not marked HTTP-Only. This allows the&lt;BR /&gt; cookie to be manipulated by client-side code (java,&lt;BR /&gt; javascript, actionscript, etc.) which could leave the site vulnerable to Cross-Site&lt;BR /&gt; Scripting vulnerabilities.&lt;BR /&gt; » Define all cookies as HTTP-only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I've done some searching but couldn't find a similar case to this question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firwall that is used:&lt;/P&gt;&lt;P&gt;Cisco ASA 5510 &lt;/P&gt;&lt;P&gt;software version 8.2(3)&lt;/P&gt;&lt;P&gt;ASDM: 6.3(4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Used feature that causes the cookie error (I've inspected the cookie object with Chrome and noticed that the HTTP-Only feature was indeed not enabled on this site/feature): AnyConnect (&amp;amp; AnyConnect Essentials)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know if it's possible to even set the HTTP-Only mark in the cookie by yourself, or do you rely on a software update?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:14:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159132#M360106</guid>
      <dc:creator>SLTN Servicedesk</dc:creator>
      <dc:date>2019-03-12T01:14:36Z</dc:date>
    </item>
    <item>
      <title>[ASA5510] Cisco AnyConnect - Cookie not HTTP-Only</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159133#M360107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the bugID for the above HTTP-Only cookie issue: &lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCth55933" target="_blank"&gt;CSCth55933&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId="&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=&lt;/A&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCth55933" target="_blank"&gt;CSCth55933&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls kindly check on the explaination on further description:&lt;/P&gt;&lt;P&gt;While this is not a false positive, any vulnerability would be in the&amp;nbsp; cross-site scripting attack and not in the lack of cookie protection&amp;nbsp; through the use of the HttpOnly flag. This bug documents the&amp;nbsp; investigation into cookie protection on the ASA. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Mar 2013 21:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159133#M360107</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-03-17T21:30:29Z</dc:date>
    </item>
    <item>
      <title>[ASA5510] Cisco AnyConnect - Cookie not HTTP-Only</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159134#M360108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have read the content of the link, but it points to using the "Next Generation software" is the version 9 series next generation?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jul 2013 07:51:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159134#M360108</guid>
      <dc:creator>David26320</dc:creator>
      <dc:date>2013-07-30T07:51:54Z</dc:date>
    </item>
    <item>
      <title>[ASA5510] Cisco AnyConnect - Cookie not HTTP-Only</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159135#M360111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are running ver 8.2(5)41 on 5520 and internal security scan pointed same vulnerability. Is there a fix for this bug?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Aug 2013 23:10:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159135#M360111</guid>
      <dc:creator>Waqar Rana</dc:creator>
      <dc:date>2013-08-12T23:10:38Z</dc:date>
    </item>
    <item>
      <title>[ASA5510] Cisco AnyConnect - Cookie not HTTP-Only</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159136#M360112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This link is not good anymore. Is there any fix to the PCI DSS failure?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Sep 2013 15:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159136#M360112</guid>
      <dc:creator>schynam</dc:creator>
      <dc:date>2013-09-20T15:10:19Z</dc:date>
    </item>
    <item>
      <title>[ASA5510] Cisco AnyConnect - Cookie not HTTP-Only</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159137#M360113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cisco, any updates on this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 23:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159137#M360113</guid>
      <dc:creator>haskelman</dc:creator>
      <dc:date>2013-12-05T23:32:39Z</dc:date>
    </item>
    <item>
      <title>[ASA5510] Cisco AnyConnect - Cookie not HTTP-Only</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159138#M360114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The resolution tried at my organization was to either upgrade the IOS or downgrade to AnyConnect 3.0. Downgrading AnyConnect was the easier route.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Dec 2013 00:13:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159138#M360114</guid>
      <dc:creator>schynam</dc:creator>
      <dc:date>2013-12-06T00:13:42Z</dc:date>
    </item>
    <item>
      <title>I am configuring AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159139#M360115</link>
      <description>&lt;P&gt;I am configuring AnyConnect for the first time on an ASA 5510 running 9.0(4) and encountering the same issue. &amp;nbsp;Has anyone found a solution to the HTTP&amp;nbsp;only flag on the cookie?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2015 14:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159139#M360115</guid>
      <dc:creator>gchevalley</dc:creator>
      <dc:date>2015-01-20T14:37:44Z</dc:date>
    </item>
    <item>
      <title>The bug track is:</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159140#M360116</link>
      <description>&lt;P&gt;The bug track is:&lt;/P&gt;
&lt;P&gt;https://tools.cisco.com/bugsearch/bug/CSCuc23836&lt;/P&gt;
&lt;P&gt;To fix for this potential vulnerability&amp;nbsp;Cisco will need to&amp;nbsp;update their ASA VPN software to support the HTTP Only flag (when rendering html with cookie's)&amp;nbsp;.&amp;nbsp; so far Cisco has not put a fix in and doesn't appear to have any plans to modify the IOS to support the HttpOnly flag.&lt;/P&gt;
&lt;P&gt;Browsers have supported this flag for over a decade, yet, Cisco does not support it.&lt;/P&gt;
&lt;P&gt;https://www.owasp.org/index.php/HttpOnly&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 21:37:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cisco-anyconnect-cookie-not-http-only/m-p/2159140#M360116</guid>
      <dc:creator>andrew.stravitz1</dc:creator>
      <dc:date>2016-02-25T21:37:05Z</dc:date>
    </item>
  </channel>
</rss>

