This vulnerability occurs when an application makes security decisions—like granting access or verifying identity—based solely on cookie data without first confirming the cookie's authenticity or integrity.
Attackers can easily manipulate cookie values directly in the browser or by crafting custom client-side requests. Since the application trusts this data without validation, attackers can forge cookies to impersonate other users, bypass login screens, or escalate their privileges by inserting expected values. To prevent this, developers must never treat cookies as a trusted security mechanism on their own. Always validate and verify cookie integrity on the server using techniques like cryptographic signing, comparing against server-side sessions, or using secure, tamper-proof tokens instead of plain data.
Impact: Bypass Protection MechanismGain Privileges or Assume Identity
It is dangerous to use cookies to set a user's privileges. The cookie can be manipulated to claim a high level of authorization, or to claim that successful authentication has occurred.
javaphpjavaHigh