4.4.16 Ensure HTTP session overflow is 'disabled'

Information

Applications that use in-memory HTTP sessions can configure if overflow is allowed and the number of sessions that can be created.

Disabling session overflow and the number of maximum number of sessions allowed helps to avoid denial-of-service attacks in which attackers generate new sessions until all JVM memory is exhausted.

Solution

Set the allowOverflow attribute on the httpSession element to the value of false in ${server.config.dir}/configDropins/overrides/*.xml Also set the maxInMemorySessionCount attribute on the httpSession element to a maximum number of sessions the JVM is able to support for each web module.

<httpSession allowOverflow="false" maxInMemorySessionCount="1000" />

See Also

https://workbench.cisecurity.org/benchmarks/7724

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-5

Plugin: Unix

Control ID: e9fc18f4770319e32c24d2171b6118c981fcef3803ebc0e8eab143727a40b13a