C Sharp Cookie Samesite None Set
Description
Detects when ASP.NET cookies are explicitly configured with SameSite=None, which disables SameSite protection. This makes cookies vulnerable to cross-site request forgery (CSRF) attacks since they will be sent in cross-site requests, potentially allowing malicious sites to perform unauthorized actions.
Detection Strategy
• Identifies cookie configurations in ASP.NET applications where SameSiteMode is set to None
• Looks for specific assignments of SameSiteMode.None in cookie-related code
• Reports a vulnerability when a cookie's SameSite property is explicitly disabled through SameSiteMode.None
• Only flags issues within ASP.NET cookie configuration contexts
Vulnerable code example
using Microsoft.AspNetCore.Http;
using Microsoft.Extensions.DependencyInjection;
public class CookieConfig
{
public void ConfigureServices(IServiceCollection services)
{
// Vulnerable: Setting SameSite=None makes cookies vulnerable to CSRF attacks...✅ Secure code example
using Microsoft.AspNetCore.Http;
using Microsoft.Extensions.DependencyInjection;
public class CookieConfig
{
public void ConfigureServices(IServiceCollection services)
{
// Secure: Set SameSite=Strict to prevent CSRF by blocking cross-site cookie transmission...Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.