OH12-1X-000049 - OHS must capture, record, and log all content related to a user session.

Information

A user session to a web server is in the context of a user accessing a hosted application that extends to any plug-ins/modules and services that may execute on behalf of the user.

The web server must be capable of enabling a setting for troubleshooting, debugging, or forensic gathering purposes which will log all user session information related to the hosted application session. Without the capability to capture, record, and log all content related to a user session, investigations into suspicious user activity would be hampered.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor that contains a '<VirtualHost>' directive.

2. Search for the 'LogFormat' directive with nicknames of 'dod' and 'dod_ssl' at the OHS server and virtual host configuration scopes.

3a. If the session id is contained within a cookie, modify the 'LogFormat' directive with nicknames of 'dod' and 'dod_ssl' to include 'sess:%{JSESSIONID}C', add the directive if it does not exist unless inherited from a larger scope.
3b. If the session id is contained within a header variable, modify the 'LogFormat' directives with nicknames of 'dod' and 'dod_ssl' to include 'sess:%{X-JSESSIONID}o' dod', add the directive if it does not exist unless inherited from a larger scope.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R2_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-10, CAT|II, CCI|CCI-000054, Rule-ID|SV-252204r879887_rule, STIG-ID|OH12-1X-000049, STIG-Legacy|SV-77643, STIG-Legacy|V-63153, Vuln-ID|V-252204

Plugin: Unix

Control ID: 7e19174ffc2793c9178fd42709f5160bf74af5e9489c1e1853c728bf3ef3d4b9