Hi

I do not see how SameSite attribute would help in this case. Or how do you
mean that it would protect against this?

// Ola

On Thu, 12 Mar 2020 at 22:02, Brian May <b...@debian.org> wrote:

> Ola Lundqvist <o...@inguza.com> writes:
>
> > I have ideas on how we can reduce the attack possibilities but I cannot
> > find any perfect solution to this.
>
> What about setting samesite=Lax in the session Cookie? This should solve
> all problems for POST requests. Are there any vulnerable GET requests?
> Additionally this is already the default for Chrome (I don't think
> Firefox has done this yet though).
>
> https://web.dev/samesite-cookies-explained/
>
> I posted this suggestion upstream also, but got no response - yet.
> https://github.com/phppgadmin/phppgadmin/issues/94#issuecomment-597464834
>
> Only problem is older browsers won't be protected, I am not sure this is
> a big issue however.
>
> I imagine setting the samesite value will be a lot less invasive then
> some of the other solutions being discussed here.
>
> The other problem might be implementing this. I see PHP has a
> session.cookie_samesite option but this was only implemented in PHP >=
> 7.3
>
> https://www.php.net/manual/en/session.configuration.php
> --
> Brian May <b...@debian.org>
>


-- 
 --- Inguza Technology AB --- MSc in Information Technology ----
|  o...@inguza.com                    o...@debian.org            |
|  http://inguza.com/                Mobile: +46 (0)70-332 1551 |
 ---------------------------------------------------------------

Reply via email to