Firstly, a warm welcome to all PCI DSS refugees! In addition, third-party developers of Google Apps, Webinspect, Hailstorm, and NTOSpider supporters are invited. Take a seat right here, I have a cake for you:
While it's too late for Peter, it is actually possible that JRun will generate HTTPOnly (and secure) cookies from the very beginning, as he requested. Locate the jrun-web.xml . It will probably be in a directory, for example
C:\JRun4\servers\servername\cfusion-ear\cfusion-war\WEB-INF\ .
You should add the following to the cookie-config section:
<cookie-config> <cookie-path>/;HttpOnly</cookie-path> </cookie-config>
If your site is HTTPS, you must also enable the secure cookie option. But be careful, its server is wide and not application specific. Therefore, it may not be suitable for your general environment:
<cookie-config> <cookie-secure>true</cookie-secure> <cookie-path>/;HttpOnly</cookie-path> </cookie-config>
If you are not stuck in MX7 or CF8, there is an official setting for this in CF9.01 Dcoldfusion.sessioncookie.httponly
I tested this on ColdFusion MX7 and it works as expected. Evasive apps I made.
Amit naidu
source share