apply documentation suggestions

Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
This commit is contained in:
Erik Krogh Kristensen
2022-01-25 12:14:16 +01:00
committed by GitHub
parent d4bac887cf
commit 9f9dee5d18
3 changed files with 4 additions and 4 deletions

View File

@@ -6,11 +6,11 @@
<overview>
<p>
Authentication cookies where the SameSite attribute is set to "None" can
potentially be used to perform cross-site request forgery (CSRF) attacks
potentially be used to perform Cross-Site Request Forgery (CSRF) attacks
if no other CSRF protections are in place.
</p>
<p>
With SameSite set to "None" a third party website may create an authorized cross-site request
With SameSite set to "None", a third party website may create an authorized cross-site request
that includes the cookie.
Such a cross-site request can allow that website to perform actions on behalf of a user.
</p>

View File

@@ -1,7 +1,7 @@
/**
* @name Sensitive cookie without SameSite restrictions
* @description Sensitive cookies where the SameSite attribute is set to "None" can
* in some cases allow for Cross-site request forgery (CSRF) attacks.
* in some cases allow for Cross-Site Request Forgery (CSRF) attacks.
* @kind problem
* @problem.severity warning
* @security-severity 5.0

View File

@@ -1,4 +1,4 @@
---
category: newQuery
---
* A new query `js/samesite-none-cookie` has been added. The query detects when the SameSite attribute on a sensitive cookie is set to None.
* A new query `js/samesite-none-cookie` has been added. The query detects when the SameSite attribute is set to None on a sensitive cookie.