CSRF cookies don't set SameSite Attribute. Will soon be rejected by browsers.
See original GitHub issueInstall from Git, last week.
Developer tools console shows:
Cookie “multisite-ckkclehap000k3i4sxv7zp87b.csrf” will be soon rejected because it has the “SameSite” attribute set to “None” or an invalid value, without the “secure” attribute. To know more about the “SameSite“ attribute, read https://developer.mozilla.org/docs/Web/HTTP/Headers/Set-Cookie/SameSite
To Reproduce
Step by step instructions to reproduce the behavior:
- Turn on Developer Console in FF or Chrome, etc.
- Observe warnings.
Expected behavior
SameSite attribute set?
Describe the bug
The SameSite Attribute is missing.
Details
Version of Node.js:
12.20.1
Server Operating System:
Debian Buster
Issue Analytics
- State:
- Created 3 years ago
- Comments:26 (9 by maintainers)
Top Results From Across the Web
SameSite cookies explained - web.dev
Setting a cookie without Secure will be rejected. ... You must ensure that you pair SameSite=None with the Secure attribute. You can test...
Read more >SameSite cookies - HTTP - MDN Web Docs
Cookie myCookie will be soon rejected because it has the SameSite attribute set to None or an invalid value, without the secure attribute....
Read more >Preventing CSRF Attacks with the SameSite Cookie Attribute
This article explains how the Samesite web cookie attribute works and how it can be used to prevent cross-site request forgery (CSRF) attacks....
Read more >How to handle SameSite cookie changes in Chrome browser
SameSite is a property that can be set in HTTP cookies to prevent Cross Site Request Forgery(CSRF) attacks in web applications:.
Read more >Session cookie set `SameSite=None; Secure;` does not work
Sometome cookies wouldn't work as expected because Some cookies are misusing the sameSite attribute. Cookie SomeCookie ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Defaulting to secure would be too, for A2. So probably we just need to document best practices here and possibly put something in apostrophe-boilerplate.
On Wed, Jan 27, 2021 at 10:48 AM Tom Boutell tom@apostrophecms.com wrote:
–
THOMAS BOUTELL | CHIEF TECHNOLOGY OFFICER APOSTROPHECMS | apostrophecms.com | he/him/his
Thx, that is really interesting.