VCUI-67-000004 - vSphere UI must protect cookies from XSS.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server and its applications. When a cookie is tagged with the 'HttpOnly' flag, it tells the browser that this particular cookie should only be accessed by the originating server. Any attempt to access the cookie from client script is strictly forbidden.

Satisfies: SRG-APP-000001-WSR-000002, SRG-APP-000439-WSR-000154

Solution

Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/context.xml.

Add the following configuration to the <Context> node:

useHttpOnly='true'

Example:

<Context useHttpOnly='true' sessionCookieName='VSPHERE-UI-JSESSIONID' sessionCookiePath='/ui'>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000054, CCI|CCI-002418, Rule-ID|SV-239685r679161_rule, STIG-ID|VCUI-67-000004, Vuln-ID|V-239685

Plugin: Unix

Control ID: 07e8de1648d5190094fc30ffbb249ba6543e6253e2dcb41db10ad357f21a11f5