UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The web server must invalidate session identifiers upon hosted application user logout or other session termination.


Overview

Finding ID Version Rule ID IA Controls Severity
V-206396 SRG-APP-000220-WSR-000201 SV-206396r879637_rule Medium
Description
Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries from capturing and continuing to employ previously valid session IDs. Session IDs are tokens generated by web applications to uniquely identify an application user's session. Unique session IDs help to reduce predictability of said identifiers. When a user logs out, or when any other session termination event occurs, the web server must terminate the user session to minimize the potential for an attacker to hijack that particular user session.
STIG Date
Web Server Security Requirements Guide 2023-09-13

Details

Check Text ( C-6657r377780_chk )
Review the web server documentation and deployed configuration to verify that the web server is configured to invalidate session identifiers when a session is terminated.

If the web server does not invalidate session identifiers when a session is terminated, this is a finding.
Fix Text (F-6657r377781_fix)
Configure the web server to invalidate session identifiers when a session is terminated.