AS24-U1-000870 - Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data - Session

Information

A cookie can be read by client-side scripts easily if cookie properties are not set properly. By allowing cookies to be read by the client-side scripts, information such as session identifiers could be compromised and used by an attacker who intercepts the cookie. Setting cookie properties (i.e., HttpOnly property) to disallow client-side scripts from reading cookies better protects the information inside the cookie.

Satisfies: SRG-APP-000439-WSR-000154, SRG-APP-000439-WSR-000155

Solution

Determine the location of the 'HTTPD_ROOT' directory and the 'httpd.conf' file:

# apachectl -V | egrep -i 'httpd_root|server_config_file'
-D HTTPD_ROOT='/etc/httpd'
-D SERVER_CONFIG_FILE='conf/httpd.conf'

NOTE: SSL directives may also be located in /etc/httpd/conf.d/ssl.conf.

Set 'Session' to 'on'.

Ensure the 'SessionCookieName' directive includes 'httpOnly' and 'secure'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apache_Server_2-4_Unix_Y24M07_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-8, CAT|II, CCI|CCI-002418, Rule-ID|SV-214268r961632_rule, STIG-ID|AS24-U1-000870, STIG-Legacy|SV-102829, STIG-Legacy|V-92741, Vuln-ID|V-214268

Plugin: Unix

Control ID: 002819021fd08e6a2a07f36942031e46dd17ff88eff31f093b2cc53b50d8d351