VCST-80-000129 The vCenter STS service cookies must have 'http-only' flag set.

Information

Cookies are a common way to save session state over the HTTP(S) protocol. If attackers can compromise session data stored in a cookie, they are better able to launch an attack against the server and its applications. When a cookie is tagged with the 'HttpOnly' flag, it tells the browser this particular cookie should only be accessed by the originating server. Any attempt to access the cookie from client script is strictly forbidden.

Solution

Navigate to and open:

/usr/lib/vmware-sso/vmware-sts/conf/web.xml

Navigate to the <session-config> node and configure the <http-only> as follows:

<session-config>
<session-timeout>30</session-timeout>
<cookie-config>
<http-only>true</http-only>
<secure>true</secure>
</cookie-config>
</session-config>

Restart the service with the following command:

# vmon-cli --restart sts

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_8-0_Y24M08_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3, CAT|II, CCI|CCI-000213, Rule-ID|SV-258988r960792_rule, STIG-ID|VCST-80-000129, Vuln-ID|V-258988

Plugin: Unix

Control ID: 238fc6c98c9dc6fa2df323eb2d3aae962035e428ec3d28749210b349b1c68ebd