Check: CF11-05-000168
Adobe ColdFusion 11 STIG:
CF11-05-000168
(in versions v2 r1 through v1 r2)
Title
ColdFusion must use J2EE session variables. (Cat II impact)
Discussion
Unique session IDs are the opposite of sequentially generated session IDs, which can be easily guessed by an attacker. Unique session identifiers help to reduce predictability of session identifiers. Unique session IDs address man-in-the-middle attacks, including session hijacking or insertion of false information into a session. If the attacker is unable to identify or guess the session information related to pending application traffic, they will have more difficulty in hijacking the session or otherwise manipulating valid sessions. By enabling J2EE session management, each session is given a unique and non-sequential session id which is shared between the JVM and the ColdFusion application allowing for easier session management. J2EE session management stores the session data within a cookie stored in memory which will only exist while the session is valid. When J2EE sessions management is not used, the cookie is stored on the hard drive allowing for a cookie that can be easily harvested by an attacker.
Check Content
Within the Administrator Console, navigate to the "Memory Variables" page under the "Server Settings" menu. If "Use J2EE session variables" is not checked, this is a finding.
Fix Text
Navigate to the "Memory Variables" page under the "Server Settings" menu. Check "Use J2EE session variables" and select the "Submit Changes" button.
Additional Identifiers
Rule ID: SV-237200r641695_rule
Vulnerability ID: V-237200
Group Title: SRG-APP-000223-AS-000150
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001664 |
Recognize only session identifiers that are system-generated. |
Controls
Number | Title |
---|---|
SC-23(3) |
Unique Session Identifiers with Randomization |