A security research toolkit for identifying, testing, and validating cookie parsing inconsistencies across browser and server implementations.
This toolkit is designed for legitimate security research, testing, and educational purposes only. It helps security professionals identify potential vulnerabilities in web applications related to cookie handling. Misuse of this tool may be illegal and unethical. Always obtain proper authorization before testing any system.
Cookies remain a fundamental but flawed part of web security. Despite RFCs and browser security improvements, inconsistencies in cookie parsing between clients and servers create security vulnerabilities:
- No version negotiation
- No canonical encoding standard
- Case-insensitive handling inconsistencies
- Silent discards and truncations
- Ambiguous delimiters and parsing rules
The Cookie Confusion Toolkit helps security professionals identify these issues through:
- Systematic testing of cookie handling across browsers and server frameworks
- Identification of parsing inconsistencies that could lead to security bypasses
- Documentation of vulnerabilities for remediation
- Responsible disclosure guidelines and support
- cookiebomb: Generate test cases with edge-case cookies (collisions, overlong values, etc.)
- clientfork: Emulate browser cookie handling with configurable policies
- serverdrift: Test server-side frameworks for parsing inconsistencies
- bypassgen: Identify potential security implications of discovered inconsistencies
This toolkit is released under the MIT license with an additional ethical use clause. By using this software, you agree to:
- Only test systems you own or have explicit permission to test
- Follow responsible disclosure practices when vulnerabilities are found
- Not use this toolkit for unauthorized access or exploitation
- Share improvements to the wider security community
This toolkit is based on extensive research into cookie parsing inconsistencies that affect web security. For technical details on the underlying issues, see docs/research_background.md.
- Python 3.10+
- Requests
- Selenium WebDriver
- BeautifulSoup
- Pytest (for running tests)
# Clone and install
git clone https://github.com/geeknik/cookie-confusion-toolkit.git
cd cookie-confusion-toolkit
pip install -e .
# Check out the help and hack the planet!
cct --help
Contributions that improve the toolkit's ability to identify security issues for defensive purposes are welcome. See CONTRIBUTING.md for guidelines.
MIT with Ethical Use Clause - See LICENSE for details.