UCF STIG Viewer Logo

Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.


Overview

Finding ID Version Rule ID IA Controls Severity
V-92741 AS24-U1-000870 SV-102829r1_rule Medium
Description
A cookie can be read by client-side scripts easily if cookie properties are not set properly. By allowing cookies to be read by the client-side scripts, information such as session identifiers could be compromised and used by an attacker who intercepts the cookie. Setting cookie properties (i.e., HttpOnly property) to disallow client-side scripts from reading cookies better protects the information inside the cookie. Satisfies: SRG-APP-000439-WSR-000154, SRG-APP-000439-WSR-000155
STIG Date
Apache Server 2.4 UNIX Server Security Technical Implementation Guide 2019-09-30

Details

Check Text ( C-92047r1_chk )
In a command line, run "httpd -M | grep -i session_cookie_module".

Determine the location of the "HTTPD_ROOT" directory and the "httpd.conf" file:

# httpd -V | egrep -i 'httpd_root|server_config_file'
-D HTTPD_ROOT="/etc/httpd"
-D SERVER_CONFIG_FILE="conf/httpd.conf"

Search for the directive "Session" in the "httpd.conf" file:

# cat //httpd.conf | grep -i "Session"

If the "Session" and "SessionCookieName" directives are not present, this is a finding.

If "Session" is not set to "on" and "SessionCookieName" does not contain "httpOnly" and "secure", this is a finding.
Fix Text (F-98985r1_fix)
Determine the location of the "HTTPD_ROOT" directory and the "httpd.conf" file:

# httpd -V | egrep -i 'httpd_root|server_config_file'
-D HTTPD_ROOT="/etc/httpd"
-D SERVER_CONFIG_FILE="conf/httpd.conf"

Set "Session" to "on".

Ensure the "SessionCookieName" directive includes "httpOnly" and "secure".