STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide

V-256709

CAT II (Medium)

Lookup Service must protect cookies from cross-site scripting (XSS).

Rule ID

SV-256709r888718_rule

STIG

VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000054, CCI-001664, CCI-002418

Discussion

Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server and its applications. When a cookie is tagged with the "HttpOnly" flag, it tells the browser that this particular cookie should only be accessed by the originating server. Any attempt to access the cookie from client script is strictly forbidden. Satisfies: SRG-APP-000001-WSR-000002, SRG-APP-000223-WSR-000011, SRG-APP-000439-WSR-000154

Check Content

At the command prompt, run the following command:

# xmllint --format /usr/lib/vmware-lookupsvc/conf/context.xml | xmllint --xpath '/Context/@useHttpOnly' -

Expected result:

useHttpOnly="true"

If the output does not match the expected result, this is a finding.

Fix Text

Navigate to and open:

/usr/lib/vmware-lookupsvc/conf/context.xml

Add the following configuration to the <Context> node:

useHttpOnly="true"

Example:

<Context useHttpOnly="true">

Restart the service with the following command:

# vmon-cli --restart lookupsvc