Reading around the web suggests I should be able to set directives
inside nginx, such as this
but when I do it breaks the xnat session timeout. I login and the session immediately expires.
right now I am sitting with the firefox developer tools trying to see
exactly what is happening.
hoping I might have a eureka moment shortly.....
But if anyone out there has an good working xnat + nginx and they are willing to show me the relevent bits of config files of I'd appreciate it
but so far not helped...
the report from the vulnerability scanner is below..... and will probably contain some obvious clue Ive missed!
==============================================================
Summary
a server with SSL/TLS is prone to an information disclosure vulnerability.
Detection Result
==============================================================
The cookies:
Set-Cookie: JSESSIONID=***replaced***; Path=/; HttpOnly
Set-Cookie: SESSION_EXPIRATION_TIME="1665579682505,900000";
Version=***replaced***; Path=/
are missing the "secure" attribute.
Insight
The flaw is due to cookie is not using 'secure' attribute, which
allows cookie to be passed to the server by the client over
non-secure channels (http) and allows attacker
to conduct session hijacking attacks.
Detection Method
Details:
SSL/TLS: Missing `secure` Cookie Attribute OID: 1.3.6.1.4.1.25623.1.0.902661
Version used:
2022-02-15T13:40:32Z
Affected Software/OS
Server with SSL/TLS.
Solution
Solution Type:
Mitigation
Set the 'secure' attribute for any cookies that are sent over a SSL/TLS
connection.
References
Other
https://www.owasp.org/index.php/SecureFlaghttp://www.ietf.org/rfc/rfc2965.txthttps://www.owasp.org/index.php/Testing_for_cookies_attributes_(OWASP-SM-002)
==============================================================
Summary
The application is missing the 'httpOnly' cookie attribute
Detection Result
==============================================================
The cookies:
Set-Cookie: SESSION_EXPIRATION_TIME="1665587461869,900000";
Version=***replaced***; Path=/
are missing the "httpOnly" attribute.
Insight
The flaw is due to a cookie is not using the 'httpOnly' attribute. This
allows a cookie to be accessed by JavaScript which could lead to
session hijacking attacks.
Detection Method
Check all cookies sent by the application for a missing 'httpOnly' attribute
Details:
Missing `httpOnly` Cookie Attribute OID: 1.3.6.1.4.1.25623.1.0.105925
Version used:
2020-08-24T15:18:35Z
Affected Software/OS
Application with session handling in cookies.
Solution
Solution Type:
Mitigation
Set the 'httpOnly' attribute for any session cookie.