Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-92435 | AS24-W1-000650 | SV-102523r1_rule | Medium |
Description |
---|
Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By closing sessions after a set period of inactivity, the Apache web server can make certain that those sessions that are not closed through the user logging out of an application are eventually closed. Acceptable values are 5 minutes for high-value applications, 10 minutes for medium-value applications, and 20 minutes for low-value applications. |
STIG | Date |
---|---|
Apache Server 2.4 Windows Server Security Technical Implementation Guide | 2019-05-23 |
Check Text ( C-91735r1_chk ) |
---|
Review the <'INSTALL PATH'>\conf\httpd.conf file. Verify the "mod_reqtimeout" is loaded. If it does not exist, this is a finding. If the "mod_reqtimeout" module is loaded and the "RequestReadTimeout" directive is not configured, this is a finding. |
Fix Text (F-98675r1_fix) |
---|
Edit the <'INSTALL PATH'>\conf\httpd.conf file and load the "mod_reqtimeout" module. Set the "RequestReadTimeout" directive. Restart the Apache service. |