<html>
<head>
<base href="https://bugs.webkit.org/" />
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_NEW "
title="NEW - Implement the `SameSite` cookie attribute."
href="https://bugs.webkit.org/show_bug.cgi?id=159464">159464</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>Implement the `SameSite` cookie attribute.
</td>
</tr>
<tr>
<th>Classification</th>
<td>Unclassified
</td>
</tr>
<tr>
<th>Product</th>
<td>WebKit
</td>
</tr>
<tr>
<th>Version</th>
<td>WebKit Nightly Build
</td>
</tr>
<tr>
<th>Hardware</th>
<td>Unspecified
</td>
</tr>
<tr>
<th>OS</th>
<td>Unspecified
</td>
</tr>
<tr>
<th>Status</th>
<td>NEW
</td>
</tr>
<tr>
<th>Severity</th>
<td>Enhancement
</td>
</tr>
<tr>
<th>Priority</th>
<td>P2
</td>
</tr>
<tr>
<th>Component</th>
<td>WebCore Misc.
</td>
</tr>
<tr>
<th>Assignee</th>
<td>webkit-unassigned@lists.webkit.org
</td>
</tr>
<tr>
<th>Reporter</th>
<td>mkwst@chromium.org
</td>
</tr></table>
<p>
<div>
<pre><a href="https://tools.ietf.org/html/draft-ietf-httpbis-cookie-same-site">https://tools.ietf.org/html/draft-ietf-httpbis-cookie-same-site</a> defines a `SameSite` cookie attribute which allows servers to mitigate the risk of cross-site request forgery attacks, as well as some kinds of cross-origin information leakage.
Chrome shipped this feature in 51 (<a href="https://bugs.chromium.org/p/chromium/issues/detail?id=459154#c32">https://bugs.chromium.org/p/chromium/issues/detail?id=459154#c32</a>), Firefox is working on an implementation (<a href="https://bugzilla.mozilla.org/show_bug.cgi?id=795346">https://bugzilla.mozilla.org/show_bug.cgi?id=795346</a>). It would be lovely if WebKit could do the same.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>