Scan your site now

Security Report Summary
E
Site:
Scanned Site(s):
1
IP Address:
2.21.37.146
Report Time:
17 Nov 2019 00:47:16 UTC
Checks:
Secure
Http Only
Same Site
Host Only
Path Only
Future Expire
Unsafe Generation
Warning:
Please have a look at the security issues / warnings in the report.
Security Issues
Secure
The secure flag guarantees a secure transmission of the cookie. Only if a secure HTTPS connection to the host is available, the cookie is sent along the request. The default value of this flag is false, so it has to be activated by using the following generation command (PHP):
setcookie($name, $value, $expire, $path, $domain, 1, $httponly);
  • dp1=bbl/DE6192ff92^; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:14 GMT[https://www.ebay.com/]
  • nonsession=BAQAAAW4fHJjkAAaAADMABV+xzBIxMDExNQDKACBhkv+SNzZkM2ZkYTMxNmUwYWE0OGFlYTE5ZmRlZmZkNThkOTYAywABXdCfmjGmZswtJ0TitaJd/CtShhCfpcbVHw**; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:14 GMT[https://www.ebay.com/]
  • s=CgAD4ACBd0eoSNzZkM2ZkYTMxNmUwYWE0OGFlYTE5ZmRlZmZkNThkOTZ/Hz/a; Domain=.ebay.com; Path=/; HttpOnly[https://www.ebay.com/]
  • dp1=bbl/DE6192ff93^; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:15 GMT[https://www.ebay.com/]
  • nonsession=BAQAAAW4fHJjkAAaAADMABV+xzBMxMDExNQDKACBhkv+TNzZkM2ZmMjAxNmUwYWQzMWMzYzc2MTVjZmZjYzFhNTcAywABXdCfmzF5YwXcesvjk6FBi05w8sBz73NajQ**; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:15 GMT[https://www.ebay.com/]
  • s=CgAD4ACBd0eoTNzZkM2ZmMjAxNmUwYWQzMWMzYzc2MTVjZmZjYzFhNTflZ8iJ; Domain=.ebay.com; Path=/; HttpOnly[https://www.ebay.com/]
  • ebay=%5Esbf%3D%23000000%5E; Domain=.ebay.com; Path=/[https://www.ebay.com/]
Http Only
By using the HTTPOnly Flag, cookies can not be read / modified by embedded JavaScript. The default value of this flag is false, so it has to be activated by using the following generation command (PHP):
setcookie($name, $value, $expire, $path, $domain, $secure, 1);
  • dp1=bbl/DE6192ff92^; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:14 GMT[https://www.ebay.com/]
  • nonsession=BAQAAAW4fHJjkAAaAADMABV+xzBIxMDExNQDKACBhkv+SNzZkM2ZkYTMxNmUwYWE0OGFlYTE5ZmRlZmZkNThkOTYAywABXdCfmjGmZswtJ0TitaJd/CtShhCfpcbVHw**; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:14 GMT[https://www.ebay.com/]
  • dp1=bbl/DE6192ff93^; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:15 GMT[https://www.ebay.com/]
  • nonsession=BAQAAAW4fHJjkAAaAADMABV+xzBMxMDExNQDKACBhkv+TNzZkM2ZmMjAxNmUwYWQzMWMzYzc2MTVjZmZjYzFhNTcAywABXdCfmzF5YwXcesvjk6FBi05w8sBz73NajQ**; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:15 GMT[https://www.ebay.com/]
  • ebay=%5Esbf%3D%23000000%5E; Domain=.ebay.com; Path=/[https://www.ebay.com/]
Same Site
The SameSite flag prevents the browser from sending a cookie along with cross-site requests. It can be set to strict or lax, where strict means that the cookie will not be available after leaving a site (used on bank websites). Lax will just not send the cookie along with CSRF-prone request methods (eg. POST) so this is often a reasonable balance between security and usability. To integrate this flag using PHP, the attribute has to be added as a string after another attribute.
setcookie($name, $value, $expire, $path, $domain, $secure, $httponly."; samesite=lax");
  • dp1=bbl/DE6192ff92^; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:14 GMT[https://www.ebay.com/]
  • nonsession=BAQAAAW4fHJjkAAaAADMABV+xzBIxMDExNQDKACBhkv+SNzZkM2ZkYTMxNmUwYWE0OGFlYTE5ZmRlZmZkNThkOTYAywABXdCfmjGmZswtJ0TitaJd/CtShhCfpcbVHw**; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:14 GMT[https://www.ebay.com/]
  • s=CgAD4ACBd0eoSNzZkM2ZkYTMxNmUwYWE0OGFlYTE5ZmRlZmZkNThkOTZ/Hz/a; Domain=.ebay.com; Path=/; HttpOnly[https://www.ebay.com/]
  • dp1=bbl/DE6192ff93^; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:15 GMT[https://www.ebay.com/]
  • nonsession=BAQAAAW4fHJjkAAaAADMABV+xzBMxMDExNQDKACBhkv+TNzZkM2ZmMjAxNmUwYWQzMWMzYzc2MTVjZmZjYzFhNTcAywABXdCfmzF5YwXcesvjk6FBi05w8sBz73NajQ**; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:15 GMT[https://www.ebay.com/]
  • s=CgAD4ACBd0eoTNzZkM2ZmMjAxNmUwYWQzMWMzYzc2MTVjZmZjYzFhNTflZ8iJ; Domain=.ebay.com; Path=/; HttpOnly[https://www.ebay.com/]
  • ebay=%5Esbf%3D%23000000%5E; Domain=.ebay.com; Path=/[https://www.ebay.com/]
Warnings
Future Expire
Sensitive informations should never be stored in a cookie with the expiring date set to a time in the future. In case the web application has a vulnerability and the attacker has access to a users cookies, he could use the same stolen cookie session id until the time in the future is reached. By setting it to NULL, the cookie will be deleted after the user closes the browser.
setcookie($name, $value, NULL, $path, $domain, $secure, $httponly);
  • dp1=bbl/DE6192ff92^; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:14 GMT[https://www.ebay.com/]
  • nonsession=BAQAAAW4fHJjkAAaAADMABV+xzBIxMDExNQDKACBhkv+SNzZkM2ZkYTMxNmUwYWE0OGFlYTE5ZmRlZmZkNThkOTYAywABXdCfmjGmZswtJ0TitaJd/CtShhCfpcbVHw**; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:14 GMT[https://www.ebay.com/]
  • dp1=bbl/DE6192ff93^; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:15 GMT[https://www.ebay.com/]
  • nonsession=BAQAAAW4fHJjkAAaAADMABV+xzBMxMDExNQDKACBhkv+TNzZkM2ZmMjAxNmUwYWQzMWMzYzc2MTVjZmZjYzFhNTcAywABXdCfmzF5YwXcesvjk6FBi05w8sBz73NajQ**; Domain=.ebay.com; Path=/; Expires=Tue, 16 Nov 2021 00:47:15 GMT[https://www.ebay.com/]
Unsafe Generation
Generating a cookie using JavaScript sets the HTTPOnly flag automatically to false, since there is no way of creating a HTTPOnly-flag cookie on client side. To generate HTTPOnly cookies, use a backend-API, which will create a cookie at serverside.
  • document.cookie=a+"="+(b||"")+(d||e.bUseExp?"; expires="+c.toGMTString():"")+"; domain="+this.sCookieDomain+";[https://ir.ebaystatic.com/rs/c/inception-neSIqA16.js]
  • document.cookie=a+"="+(b||"")+(d||e.bUseExp?"; expires="+c.toGMTString():"")+"; domain="+this.sCookieDomain+";[https://ir.ebaystatic.com/rs/c/highlnfe-cxYE4qoI.js]
  • document.cookie=a+"="+b+"; "+e}},CGuidHash={_guidHash:void 0,getMod1000:function(){if("undefined"==typeof this._guidHash){var a=_plsUBTCookies.readCoo...[https://ir.ebaystatic.com/rs/v/it02syay0qyozhdaszhv1jl4yyd.js]
Additional Information
Secure
The secure flag guarantees a secure transmission of the cookie. Only if a secure HTTPS connection to the host is available, the cookie is sent along the request. The default value of this flag is false, so it has to be activated by using the following generation command (PHP):
setcookie($name, $value, $expire, $path, $domain, 1, $httponly);
Http Only
By using the HTTPOnly Flag, cookies can not be read / modified by embedded JavaScript. The default value of this flag is false, so it has to be activated by using the following generation command (PHP):
setcookie($name, $value, $expire, $path, $domain, $secure, 1);
Same Site
The SameSite flag prevents the browser from sending a cookie along with cross-site requests. It can be set to strict or lax, where strict means that the cookie will not be available after leaving a site (used on bank websites). Lax will just not send the cookie along with CSRF-prone request methods (eg. POST) so this is often a reasonable balance between security and usability. To integrate this flag using PHP, the attribute has to be added as a string after another attribute.
setcookie($name, $value, $expire, $path, $domain, $secure, $httponly."; samesite=lax");
Host Only
By setting the domain attribute, it can be specified where on a host the cookie should be accessed. If it is set to loosely, it is possible that other potentially vulnerable servers under the same host could receive the cookie.
setcookie($name, $value, $expire, $path, "app.example.com", $secure, $httponly);
Path Only
Use the path attribute of a cookie to specify as tight as possible, where on a website the cookie is allowed to access. In case this value is set to loosely, it can be vulnerable to less secure applications on the same server.
setcookie($name, $value, $expire, "/myapp/", $domain, $secure, $httponly);
Future Expire
Sensitive informations should never be stored in a cookie with the expiring date set to a time in the future. In case the web application has a vulnerability and the attacker has access to a users cookies, he could use the same stolen cookie session id until the time in the future is reached. By setting it to NULL, the cookie will be deleted after the user closes the browser.
setcookie($name, $value, NULL, $path, $domain, $secure, $httponly);
Unsafe Generation
Generating a cookie using JavaScript sets the HTTPOnly flag automatically to false, since there is no way of creating a HTTPOnly-flag cookie on client side. To generate HTTPOnly cookies, use a backend-API, which will create a cookie at serverside.
Scanned URL(s)
Electronics, Cars, Fashion, Collectibles, Coupons and More | eBay