1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
|
##
# This file is part of WhatWeb and may be subject to
# redistribution and commercial restrictions. Please see the WhatWeb
# web site for more information on licensing and terms of use.
# http://www.morningstarsecurity.com/research/whatweb
##
Plugin.define "HttpOnly" do
author "Brendan Coles <bcoles@gmail.com>" # 2011-06-03
version "0.1"
description "If the HttpOnly flag is included in the HTTP set-cookie response header and the browser supports it then the cookie cannot be accessed through client side script - More Info: http://en.wikipedia.org/wiki/HTTP_cookie"
# More Info #
# http://msdn.microsoft.com/workshop/author/dhtml/httponly_cookies.asp
# http://www.gnucitizen.org/blog/why-httponly-wont-protect-you/
# https://www.owasp.org/index.php/HttpOnly
# ShodanHQ results as at 2011-06-03 #
# 252,825 for httponly
# Passive #
def passive
m=[]
# Set-Cookie Header
unless @headers["set-cookie"].nil? or @headers["set-cookie"].empty?
=begin
@headers["set-cookie"].each do |cookie|
if cookie =~ /;[\s]*httponly/i
m << { :string=>cookie.scan(/^([^;^=]+).*;[\s]*httponly/i) } if cookie =~ /^([^;^=]+).*;[\s]*httponly/i
end
end
=end
if @headers["set-cookie"] =~ /;[\s]*httponly/i
m << { :string=>@headers["set-cookie"].scan(/^([^;^=]+).*;[\s]*httponly/i) } if @headers["set-cookie"] =~ /^([^;^=]+).*;[\s]*httponly/i
end
end
# Return passive matches
m
end
end
|