UCF STIG Viewer Logo

vSphere Client must protect cookies from XSS.


Overview

Finding ID Version Rule ID IA Controls Severity
V-239746 VCFL-67-000004 SV-239746r679465_rule Medium
Description
Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server and its applications. When a cookie is tagged with the "HttpOnly" flag, it tells the browser that this particular cookie should only be accessed by the originating server. Any attempt to access the cookie from client script is strictly forbidden. Satisfies: SRG-APP-000001-WSR-000002, SRG-APP-000223-WSR-000011, SRG-APP-000439-WSR-000154
STIG Date
VMware vSphere 6.7 Virgo-Client Security Technical Implementation Guide 2021-03-18

Details

Check Text ( C-42979r679463_chk )
At the command prompt, execute the following command:

# xmllint --xpath '/Context/@useHttpOnly' /usr/lib/vmware-vsphere-client/server/configuration/context.xml

Expected result:

useHttpOnly="true"

If the output does not match the expected result, this is a finding.
Fix Text (F-42938r679464_fix)
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/context.xml.

Configure the node as follows: