Check: SRG-APP-000224-WSR-000137
Web Server SRG:
SRG-APP-000224-WSR-000137
(in versions v4 r2 through v2 r2)
Title
The web server must generate a session ID long enough that it cannot be guessed through brute force. (Cat II impact)
Discussion
Generating a session identifier (ID) that is not easily guessed through brute force is essential to deter several types of session attacks. By knowing the session ID, an attacker can hijack a user session that has already been user authenticated by the hosted application. The attacker does not need to guess user identifiers and passwords or have a secure token since the user session has already been authenticated. Generating session IDs that are at least 128 bits (16 bytes) in length will cause an attacker to take a large amount of time and resources to guess, reducing the likelihood of an attacker guessing a session ID.
Check Content
Review the web server documentation and deployed configuration to see how long the generated session identifiers are. If the web server is not configured to generate session identifiers that are at least 128 bits (16 bytes) in length, this is a finding.
Fix Text
Configure the web server to generate session identifiers that are at least 128 bits in length.
Additional Identifiers
Rule ID: SV-206401r961119_rule
Vulnerability ID: V-206401
Group Title: SRG-APP-000224
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001188 |
Generate a unique session identifier for each session with organization-defined randomness requirements. |
Controls
Number | Title |
---|---|
SC-23(3) |
Unique Session Identifiers with Randomization |