NetScaler Fails Secure Cookie Security Vulnerability Scan When Using useSecuredPersistenceCookie Option

NetScaler Fails Secure Cookie Security Vulnerability Scan When Using useSecuredPersistenceCookie Option

book

Article ID: CTX203682

calendar_today

Updated On:

Description

PCI Security vulnerability scanners reports that NetScaler-hosted virtual servers using CookieInsert persistence are vulnerable due to not having the Secure flag set on the NSC_ persistence cookie even though the useSecuredPersistenceCookie option is enabled on the virtual servers.

Example CVEs: CVE-2004-0462, CVE-2008-3663, CVE-2008-3662, CVE-2008-0128
Qualys QID: 150122

Environment

Citrix is not responsible for and does not endorse or accept any responsibility for the contents or your use of these third party Web sites. Citrix is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by Citrix of the linked Web site. It is your responsibility to take precautions to ensure that whatever Web site you use is free of viruses or other harmful items.

Resolution

This vulnerability alert is a false positive, provided that the NetScaler is configured with the useSecuredPersistenceCookie option, in conjunction with a reasonably complex cookiePassphrase.

Additionally, Cookie Persistence cookies (which, by default, start with NSC_ ) do not contain any session-identifiable or authentication information. They only instruct the NetScaler on which backend server the connection is persistent to, meaning that the cookie cannot be used to spoof a connection or user.

Note: Prior to NetScaler 10.5 build 55.8, the useSecuredPersistenceCookie option was unavailable. On these builds, it is recommended to upgrade or to at a minimum utilize the SSL protocol with any virtual servers that use Cookie Insert persistence.


Problem Cause

  • Vulnerability scans report on the Secure flag of cookies, which signals the browser to not serve the cookie unless the connection is SSL-encrypted.  The vulnerability scan does not identify applications that use proprietary encryption to protect the contents of the cookie.
  • useSecuredPersistenceCookie option instructs the NetScaler to use proprietary encryption (using supplied passphrase) to encrypt cookie contents, which is a different modality than the vulnerability scans check for.

Issue/Introduction

PCI Security vulnerability scanners reports that NetScaler-hosted virtual servers using CookieInsert persistence are vulnerable due to not having the Secure flag set on the NSC_ persistence cookie even though the useSecuredPersistenceCookie option is enabled on the virtual servers.

Additional Information