mirror of
https://github.com/github/codeql.git
synced 2025-12-16 16:53:25 +01:00
Align alert messages across languages.
This commit is contained in:
@@ -1,5 +1,5 @@
|
||||
/**
|
||||
* @name Cookie missing `HttpOnly` attribute.
|
||||
* @name Sensitive cookie missing `HttpOnly` attribute.
|
||||
* @description Cookies without the `HttpOnly` attribute set can be accessed by JS scripts, making them more vulnerable to XSS attacks.
|
||||
* @kind problem
|
||||
* @problem.severity warning
|
||||
@@ -18,4 +18,4 @@ from Http::Server::CookieWrite cookie
|
||||
where
|
||||
cookie.hasHttpOnlyFlag(false) and
|
||||
cookie.isSensitive()
|
||||
select cookie, "Cookie is added without the HttpOnly attribute properly set."
|
||||
select cookie, "Sensitive cookie is set without HttpOnly flag."
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/**
|
||||
* @name Cookie with `SameSite` attribute set to `None`.
|
||||
* @name Sensitive cookie with `SameSite` attribute set to `None`.
|
||||
* @description Cookies with `SameSite` set to `None` can allow for Cross-Site Request Forgery (CSRF) attacks.
|
||||
* @kind problem
|
||||
* @problem.severity warning
|
||||
@@ -18,4 +18,4 @@ from Http::Server::CookieWrite cookie
|
||||
where
|
||||
cookie.hasSameSiteAttribute(any(Http::Server::CookieWrite::SameSiteNone v)) and
|
||||
cookie.isSensitive()
|
||||
select cookie, "Cookie is added with the SameSite attribute set to None."
|
||||
select cookie, "Sensitive cookie with SameSite set to 'None'."
|
||||
|
||||
@@ -19,4 +19,4 @@ from Http::Server::CookieWrite cookie
|
||||
where
|
||||
cookie.hasSecureFlag(false) and
|
||||
cookie.isSensitive()
|
||||
select cookie, "Cookie is added without the Secure attribute properly set."
|
||||
select cookie, "Cookie is added to response without the 'secure' flag being set."
|
||||
|
||||
Reference in New Issue
Block a user