STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 STS Tomcat Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

The Security Token Service must protect cookies from XSS.

DISA Rule

SV-239655r679037_rule

Vulnerability Number

V-239655

Group Title

SRG-APP-000001-WSR-000002

Rule Version

VCST-67-000004

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml.

Navigate to the <session-config> node and configure it as follows:

<session-config>
<session-timeout>30</session-timeout>
<cookie-config>
<http-only>true</http-only>
<secure>true</secure>
</cookie-config>
</session-config>

Check Contents

At the command prompt, execute the following command:

# xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/http-only' -

Expected result:

<http-only>true</http-only>

If the output does not match the expected result, this is a finding.

Vulnerability Number

V-239655

Documentable

False

Rule Version

VCST-67-000004

Severity Override Guidance

At the command prompt, execute the following command:

# xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/http-only' -

Expected result:

<http-only>true</http-only>

If the output does not match the expected result, this is a finding.

Check Content Reference

M

Target Key

5333

Comments