<s>
The	O
CookieMonster	B-Protocol
attack	I-Protocol
is	O
a	O
man-in-the-middle	O
exploit	O
where	O
a	O
third	O
party	O
can	O
gain	O
HTTPS	B-Protocol
cookie	B-Application
data	O
when	O
the	O
"	O
Encrypted	O
Sessions	O
Only	O
"	O
property	O
is	O
not	O
properly	O
set	O
.	O
</s>
<s>
It	O
is	O
a	O
Python	B-Language
based	O
tool	O
,	O
developed	O
by	O
security	O
researcher	O
Mike	O
Perry	O
.	O
</s>
<s>
Users	O
of	O
the	O
World	O
Wide	O
Web	O
can	O
reduce	O
their	O
exposure	O
to	O
CookieMonster	B-Protocol
attacks	I-Protocol
by	O
avoiding	O
websites	O
that	O
are	O
unprotected	O
to	O
these	O
attacks	O
.	O
</s>
<s>
For	O
example	O
,	O
users	O
of	O
the	O
Firefox	B-Application
browser	I-Application
can	O
go	O
to	O
the	O
Privacy	O
tab	O
in	O
the	O
Preferences	O
window	O
,	O
and	O
click	O
on	O
'	O
Show	O
Cookies.	O
'	O
</s>
<s>
For	O
a	O
given	O
site	O
,	O
inspecting	O
the	O
individual	O
cookies	B-Application
for	O
the	O
top	O
level	O
name	O
of	O
the	O
site	O
,	O
and	O
any	O
subdomain	O
names	O
,	O
will	O
reveal	O
if	O
'	O
Send	O
For	O
:	O
Encrypted	O
connections	O
only	O
,	O
'	O
has	O
been	O
set	O
.	O
</s>
<s>
If	O
it	O
has	O
,	O
the	O
user	O
can	O
test	O
for	O
the	O
site	O
's	O
vulnerability	O
to	O
CookieMonster	B-Protocol
attacks	I-Protocol
by	O
deleting	O
these	O
cookies	B-Application
and	O
visiting	O
the	O
site	O
again	O
.	O
</s>
<s>
If	O
the	O
site	O
still	O
allows	O
the	O
user	O
in	O
,	O
the	O
site	O
is	O
vulnerable	O
to	O
CookieMonster	B-Protocol
attacks	I-Protocol
.	O
</s>
