andrewmusselman opened a new issue, #543:
URL: https://github.com/apache/tooling-trusted-releases/issues/543

   ## Summary
   
   Session cookie security attributes are not explicitly configured, relying on 
external library defaults that cannot be verified.
   
   ## ASVS Requirements
   
   - 3.4.1 - Cookie-based session management
   - 3.4.2 - Cookie HttpOnly attribute
   - 14.3.1 - Cookie security attributes
   
   ## Related Audit Reports
   
   - [Weak Cryptography #399](ASVS/weak-cryptography-399.md) - Section 1
   - [External Access #400](ASVS/external-access-400.md) - Section 3.4.2
   - [Credential Stealing #403](ASVS/credential-stealing-403.md) - Section 4
   
   ## Affected Files
   
   - `atr/config.py` - Missing configuration
   - `atr/server.py` - Missing configuration
   
   ## Current Behavior
   
   No explicit SESSION_COOKIE_* settings found. Session management delegated to 
asfquart library.
   
   ## Recommended Fix
   
   ```python
   # In atr/config.py, add to AppConfig class:
   class AppConfig:
       SESSION_COOKIE_SECURE = True
       SESSION_COOKIE_HTTPONLY = True
       SESSION_COOKIE_SAMESITE = 'Lax'
       SESSION_COOKIE_NAME = '__Host-session'  # Additional security with 
__Host- prefix
   ```
   
   ## Acceptance Criteria
   
   - [ ] SESSION_COOKIE_SECURE = True
   - [ ] SESSION_COOKIE_HTTPONLY = True
   - [ ] SESSION_COOKIE_SAMESITE = 'Lax' (or 'Strict')
   - [ ] Verify asfquart respects these settings
   - [ ] Consider __Host- prefix for additional security


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to