Skip to content

The Security Token Service must protect cookies from cross-site scripting (XSS).

An XCCDF Rule

Description

Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server and its applications. When a cookie is tagged with the "HttpOnly" flag, it tells the browser that this particular cookie should only be accessed by the originating server. Any attempt to access the cookie from client script is strictly forbidden. Satisfies: SRG-APP-000001-WSR-000002, SRG-APP-000223-WSR-000011, SRG-APP-000439-WSR-000154

ID
SV-256748r889214_rule
Version
VCST-70-000004
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Navigate to and open: 
 
/usr/lib/vmware-sso/vmware-sts/conf/web.xml 
 
Navigate to the <session-config> node and configure it as follows: