Overly Long Session Timeout

Severity: Medium
Summary#

Invicti detected that the web application is using a overly long session timeout.

The session-timeout configuration element from WEB-INF/web.xml  defines the default session timeout interval for all sessions created in this web application.

The current configuration specified a session timeout value greater than 30 minutes.

Impact#

Session timeouts greater than 30 minutes are not recommended as they provide attackers more time to complete attacks and exploits. Specifically, overly long sessions make applications more susceptible to session hijacking and cross-user web attacks, such as Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS).

Actions To Take#

Decrease the value for session-timeout in the WEB-INF/web.xml like in this example:

<session-config>
  <session-timeout>30</session-timeout>
</session-config>
OR

Search Vulnerability

Invicti

Dead accurate, fast & easy-to-use Web Application Security Scanner

Get a demo