Check: AS24-W2-000640
Apache Server 2.4 Windows Site STIG:
AS24-W2-000640
(in version v2 r1)
Title
The Apache web server must set an absolute timeout for sessions. (Cat II impact)
Discussion
Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By closing sessions after an absolute period of time, the user is forced to reauthenticate, guaranteeing the session is still in use. Enabling an absolute timeout for sessions closes sessions that are still active. Examples would be a runaway process accessing the web server or an attacker using a hijacked session to slowly probe the web server.
Check Content
Review the <'INSTALL PATH'>\conf\httpd.conf file. Search for the following directive: SessionMaxAge Verify the value of "SessionMaxAge" is set to "600" or less. If the "SessionMaxAge" does not exist or is set to more than "600", this is a finding.
Fix Text
Open the <'INSTALL PATH'>\conf\httpd.conf file. Set the "SessionMaxAge" directive to a value of "600" or less; add the directive if it does not exist. Restart the Apache service.
Additional Identifiers
Rule ID: SV-214386r803282_rule
Vulnerability ID: V-214386
Group Title: SRG-APP-000295-WSR-000012
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002361 |
The information system automatically terminates a user session after organization-defined conditions or trigger events requiring session disconnect. |
Controls
Number | Title |
---|---|
AC-12 |
Session Termination |