Details
Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server and its applications.
When a cookie is tagged with the 'HttpOnly' flag, it tells the browser that this particular cookie should only be accessed by the originating server. Any attempt to access the cookie from client script is strictly forbidden.
Satisfies: SRG-APP-000001-WSR-000002, SRG-APP-000223-WSR-000011, SRG-APP-000439-WSR-000154
Solution
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/context.xml.
Configure the
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control, System and Communications Protection.This control applies to the following type of system Unix.
References
- 800-53|AC-10
- 800-53|SC-8
- 800-53|SC-23(3)
- CAT|II
- CCI|CCI-000054
- CCI|CCI-001664
- CCI|CCI-002418
- Rule-ID|SV-239746r679465_rule
- STIG-ID|VCFL-67-000004
- Vuln-ID|V-239746
Comments
Please sign in to leave a comment.