Post

Cookie Attributes in Browser

Cookies have several attributes that control how they behave in the browser. Understanding these attributes is essential for security, session management, and cross-site request handling.

Cookie Attributes in Browser

Referenced from mdn web docs

  • Because the browser is smart, it automatically manages and stores cookies.
  • When saving cookies in your browser, you can use the Set-Cookie response header to save cookies in your browser and control properties.
  • Moreover, developers need to know how backend frameworks automatically set up set-cookie.

1. Overview

AttributeDescriptionExample
Name=ValueDefines the name and value of the cookiesession_id=abc123
Expires / Max-AgeSpecifies when the cookie should expireExpires=Wed, 19 Jun 2025 12:00:00 GMT
DomainSpecifies which domain can access the cookieDomain=.example.com
PathRestricts the cookie to a specific URL pathPath=/account/
SecureEnsures the cookie is sent only over HTTPSSecure
HttpOnlyPrevents JavaScript from accessing the cookieHttpOnly
SameSiteControls how cookies are sent with cross-site requestsSameSite=Strict

AttributeDefault Behavior (If Not Set)When Explicitly Set
ExpiresSession cookie (deleted when browser closes)Persistent until a specific date
DomainOnly available on the current domainAccessible on subdomains
PathCurrent path and subdirectoriesLimited to a specific path
SecureSent over HTTP & HTTPS (security risk)Sent only over HTTPS (prevents MITM attacks)
HttpOnlyJavaScript can access (document.cookie)JavaScript cannot access (prevents XSS)
SameSiteLax (CSRF protection enabled)Strict (stronger CSRF protection) or None (allows all requests)

πŸ“Œ Secure Cookie Example:

1
Set-Cookie: session_id=xyz123; Secure; HttpOnly; SameSite=Lax; Expires=Wed, 19 Jun 2025 12:00:00 GMT

This setup ensures CSRF/XSS protection, HTTPS security, and automatic session expiration.


Every cookie consists of a name-value pair which stores data in the browser.

1
Set-Cookie: session_id=xyz123

βœ… Creates a cookie named session_id with a value of xyz123.


3.1. Expires

  • Specifies a fixed expiration date and time in GMT/UTC format.
  • Once the expiration date is reached, the browser automatically deletes the cookie.
1
Set-Cookie: session_id=xyz123; Expires=Wed, 19 Jun 2025 12:00:00 GMT

βœ… This cookie expires on June 19, 2025, at 12:00 GMT.


3.2. Max-Age

  • Specifies the cookie’s lifespan in seconds from the time it is set.
  • Max-Age=0 means the cookie expires immediately.
1
Set-Cookie: session_id=xyz123; Max-Age=3600

βœ… The cookie lasts for 1 hour (3,600 seconds) before expiring.


3.3. Difference Between Expires and Max-Age

  • Expires sets an absolute expiration date.
  • Max-Age sets a relative expiration time (in seconds).
  • If both are present, Max-Age takes precedence.

3.4. If Not set

  • The browser stores it until when the current session ends

4.1. Domain is NOT set

The cookie is only accessible from the domain that set it.

1
Set-Cookie: auth_token=xyz123

βœ… The cookie is available only on example.com.
❌ It is not accessible from sub.example.com.


4.2. Domain is set

The cookie can be accessed by the specified domain and all its

1
Set-Cookie: auth_token=xyz123; Domain=.example.com

βœ… The cookie is available on example.com, sub.example.com, blog.example.com, etc.


5.1. Path is NOT set

Path is defaulted to the path of the request URL that set the cookie (e.g. /login/), and applies to that path and its subpaths (e.g. /login/reset).


5.2. Path is set

The cookie is restricted to that specific path.

1
Set-Cookie: user_token=abc123; Path=/account/

βœ… The cookie is available only for /account/ and its subdirectories.
❌ It will not be sent with requests to /home/ or /profile/.


6. Secure (Restricting Cookies to HTTPS Only)

SituationCookie Stored?(Response)Cookie Sent?(Request)
HTTP + Secure❌ No❌ No
HTTP + no Secureβœ… Yesβœ… Yes
HTTPS + Secureβœ… Yesβœ… Yes
HTTPS + no Secureβœ… Yesβœ… Yes
1
Set-Cookie: session_id=xyz123; Secure

βœ… The cookie is only transmitted over HTTPS.
❌ It is not sent over HTTP (better security).


7. HttpOnly (Preventing JavaScript Access to Cookies)

7.1. HttpOnly is Not set

JavaScript can read and modify the cookie using document.cookie (security risk!).


7.2. HttpOnly is set

JavaScript cannot access the cookie (prevents XSS attacks).

1
Set-Cookie: session_id=xyz123; HttpOnly

βœ… Now, JavaScript cannot access session_id, but the browser will still send it in HTTP requests.


7.3. Why is HttpOnly important?

  • Prevents Cross-Site Scripting (XSS) attacks where malicious scripts steal cookies.
  • Ensures cookies can only be accessed by the server.

8. SameSite (Preventing CSRF Attacks)

  • SameSite controls whether cookies are sent with cross-site requests.
  • Cookies will automatically be included in the request if they are of the same origin.
SameSite ValueBehavior
StrictCookie is only sent for same-site requests (most secure).
Lax (Default)Cookie is sent when users click a link but not with other cross-site requests.
NoneCookie is sent with all requests, even from other sites (must be Secure).

8.1. (Lax == SameSite is Not set):

1
Set-Cookie: session_id=xyz123; SameSite=Lax

βœ… Cross-site automatic requests (like fetch,<img>,<iframe>,XMLHttpRequest) will not include the cookie, preventing CSRF attacks.
βœ… If a user clicks a link(<a href>), the cookie will be sent.


8.2. (Strict == maximum security):

1
Set-Cookie: session_id=xyz123; SameSite=Strict

βœ… The cookie is never sent with cross-site requests, even if the user clicks a link.


8.3. (None == allows all requests):

1
Set-Cookie: session_id=xyz123; SameSite=None; Secure

βœ… The cookie is sent with all requests, but Secure is required (must be HTTPS).


9. fetch

Referenced from mdn web docs

In many cases, developers use fetch function with the credential option to request a server. For security, it is important to consider the appropriate credential option.

1
2
3
fetch('https://api.example.com/profile', {
  credentials: 'include'
});
CredentialsBehavior
omitnever send credentials in the request or include credentials in the response.
same-origin (Default)only send and include credentials for same-origin requests.
includealways include credentials, even cross-origin.

However, the sameSite attribute of cookie take precedence over the credential option of fetch

ConditionGET RequestPOST Request
same-originβœ… Cookies sent automaticallyβœ… Cookies sent automatically
cross-origin + SameSite=Laxβœ… (conditionally allowed)❌ Blocked
cross-origin + SameSite=Noneβœ… (credentials: β€˜include’)βœ… (credentials: β€˜include’)
cross-origin + SameSite=Strict❌ Blocked❌ Blocked

This post is licensed under CC BY 4.0 by the author.