Check: SRG-APP-000001-WSR-000002
Web Server SRG:
SRG-APP-000001-WSR-000002
(in versions v4 r2 through v2 r2)
Title
The web server must perform server-side session management. (Cat II impact)
Discussion
Session management is the practice of protecting the bulk of the user authorization and identity information. Storing of this data can occur on the client system or on the server. When the session information is stored on the client, the session ID, along with the user authorization and identity information, is sent along with each client request and is stored in either a cookie, embedded in the uniform resource locator (URL), or placed in a hidden field on the displayed form. Each of these offers advantages and disadvantages. The biggest disadvantage to all three is the hijacking of a session along with all of the user's credentials. When the user authorization and identity information is stored on the server in a protected and encrypted database, the communication between the client and web server will only send the session identifier, and the server can then retrieve user credentials for the session when needed. If, during transmission, the session were to be hijacked, the user's credentials would not be compromised.
Check Content
Review the web server documentation and configuration to determine if server-side session management is configured. If it is not configured, this is a finding.
Fix Text
Configure the web server to perform server-side session management.
Additional Identifiers
Rule ID: SV-206351r960735_rule
Vulnerability ID: V-206351
Group Title: SRG-APP-000001
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000054 |
Limit the number of concurrent sessions for each organization-defined account and/or account type to an organization-defined number. |
Controls
Number | Title |
---|---|
AC-10 |
Concurrent Session Control |