The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-214379 | AS24-W2-000520 | SV-214379r1043181_rule | CCI-001188 | medium |
| Description | ||||
| Generating a session identifier (ID) that is not easily guessed through brute force is essential to deter several types of session attacks. By knowing the session ID, an attacker can hijack a user session that has already been user authenticated by the hosted application. The attacker does not need to guess user identifiers and passwords or have a secure token since the user session has already been authenticated. By generating session IDs that contain as much of the character set as possible, i.e., A-Z, a-z, and 0-9, the session ID becomes exponentially harder to guess. | ||||
| STIG | Date | |||
| Apache Server 2.4 Windows Site Security Technical Implementation Guide | 2025-02-12 | |||
Details
Check Text (C-214379r1043181_chk)
Review the <'INSTALLED PATH'>\conf\httpd.conf file.
Check to see if the "mod_unique_id" is loaded.
If it does not exist, this is a finding.
Fix Text (F-15588r277879_fix)
Edit the <'INSTALLED PATH'>\conf\httpd.conf file and load the "mod_unique_id" module.
Restart Apache.