Check: SRG-APP-000224-WSR-000138
Web Server SRG:
SRG-APP-000224-WSR-000138
(in versions v4 r2 through v2 r2)
Title
The web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force. (Cat II impact)
Discussion
Generating a session identifier (ID) that is not easily guessed through brute force is essential to deter several types of session attacks. By knowing the session ID, an attacker can hijack a user session that has already been user-authenticated by the hosted application. The attacker does not need to guess user identifiers and passwords or have a secure token since the user session has already been authenticated. By generating session IDs that contain as much of the character set as possible, i.e., A-Z, a-z, and 0-9, the session ID becomes exponentially harder to guess.
Check Content
Review the web server documentation and deployed configuration to determine what characters are used in generating session IDs. If the web server is not configured to use at least A-Z, a-z, and 0-9 to generate session identifiers, this is a finding.
Fix Text
Configure the web server to use at least A-Z, a-z, and 0-9 to generate session IDs.
Additional Identifiers
Rule ID: SV-206402r961119_rule
Vulnerability ID: V-206402
Group Title: SRG-APP-000224
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001188 |
Generate a unique session identifier for each session with organization-defined randomness requirements. |
Controls
Number | Title |
---|---|
SC-23(3) |
Unique Session Identifiers with Randomization |