Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

V-245539 for Chrome set to disabled #1217

Open
kwygant opened this issue Apr 5, 2023 · 4 comments
Open

V-245539 for Chrome set to disabled #1217

kwygant opened this issue Apr 5, 2023 · 4 comments
Assignees

Comments

@kwygant
Copy link

kwygant commented Apr 5, 2023

The current check for v-245539 deletes and registry values in the key at the time the check is run, but does not protect against someone entering a url in the registry or change an existing policy if one exists to enable.

If the value was set to "**delvals." it would set the policy to disabled and delete any values in the reg key.

Group Title: SRG-APP-000080

Rule Title: Session only based cookies must be disabled.

Discussion: Cookies set by pages matching these URL patterns will be limited to the current session, i.e. they will be deleted when the browser exits.

For URLs not covered by the patterns specified here, or for all URLs if this policy is not set, the global default value will be used either from the 'DefaultCookiesSetting' policy, if it is set, or the user's personal configuration otherwise.

Check Text: Universal method:

  1. In the omnibox (address bar) type chrome://policy.
  2. If the policy "CookiesSessionOnlyForUrls" exists and has any defined values, this is a finding.

Windows method:

  1. Start regedit.
  2. Navigate to HKLM\Software\Policies\Google\Chrome\CookiesSessionOnlyForUrls.
  3. If this key exists and has any defined values, this is a finding.

Fix Text: Windows group policy:

  1. Open the group policy editor tool with gpedit.msc
  2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings.
  • Policy Name: Limit cookies from matching URLs to the current session
    - Policy State: Disabled
  • Policy Value: N/A
@erjenkin
Copy link
Contributor

erjenkin commented Sep 15, 2023

Hello @kwygant ,

Can you expand on this a bit - Please update with your proposed changes to the processed STIG. A picture of the proposed registry change would be helpful.

I have not been able to find references to this: **delvals."

Thank you,

Eric

@erjenkin erjenkin self-assigned this Sep 15, 2023
@kwygant
Copy link
Author

kwygant commented Sep 15, 2023 via email

@erjenkin
Copy link
Contributor

I would be curious to know if this would trigger a positive hit on automated scanners such as Nessus or SCAP, because the STIG says ". If this key exists and has any defined values, this is a finding". Technically the key would exist and would have a value of **delvals. I will need to do a bit more research and try to get a scan to confirm this won't trigger a new finding.

@kwygant
Copy link
Author

kwygant commented Sep 19, 2023 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants