Check: AS24-W1-000500
Apache Server 2.4 Windows Server STIG:
AS24-W1-000500
(in versions v2 r3 through v1 r0.1)
Title
The Apache web server must generate unique session identifiers that cannot be reliably reproduced. (Cat II impact)
Discussion
Communication between a client and the Apache web server is done using the HTTP protocol, but HTTP is a stateless protocol. To maintain a connection or session, a web server will generate a session identifier (ID) for each client session when the session is initiated. The session ID allows the Apache web server to track a user session and, in many cases, the user, if the user previously logged on to a hosted application. Unique session IDs are the opposite of sequentially generated session IDs, which can be easily guessed by an attacker. Unique session identifiers help to reduce predictability of generated identifiers. Unique session IDs address man-in-the-middle attacks, including session hijacking or insertion of false information into a session. If the attacker is unable to identify or guess the session information related to pending application traffic, the attacker will have more difficulty in hijacking the session or otherwise manipulating valid sessions.
Check Content
Review the <'INSTALL PATH'>\conf\httpd.conf file. Check to see if the "mod_unique_id" is loaded. If it does not exist, this is a finding.
Fix Text
Edit the <'INSTALL PATH'>\conf\httpd.conf file and load the "mod_unique_id" module. Restart the Apache service.
Additional Identifiers
Rule ID: SV-214334r879639_rule
Vulnerability ID: V-214334
Group Title: SRG-APP-000224-WSR-000136
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001188 |
The information system generates unique session identifiers for each session with organization-defined randomness requirements. |
Controls
Number | Title |
---|---|
SC-23 (3) |
Unique Session Identifiers With Randomization |