I am using weblogic 10.3.6 with ATG 10.1.2
I want to make my JSESSIONID secure, I tried setting the weblogic.xml as follows,
<session-descriptor>
<cookie-name>JSESSIONID</cookie-name>
<timeout-secs>1200</timeout-secs>
<cookie-secure>true</cookie-secure>
<url-rewriting-enabled>false</url-rewriting-enabled>
</session-descriptor>
I tried turning the auth-coookie-enabled to false, to see if it then honors the cookie-secure from weblogic.xml, but it doesn't.
<web-app-container>
<x-powered-by-header-level>SHORT</x-powered-by-header-level>
<auth-cookie-enabled>false</auth-cookie-enabled>
</web-app-container>
spakred guys have posted a similar post earlier (httpOnly vulnerability fix), where they have highlighted the runAssembler command issue, the solution provided there also doesn't work with weblogic, (have left a comment there). Weblogic doesn't even check the context.xml (I tried putting an invalid XML, no errors on start up)
I have also noticed that if I change the cookie-name in weblogic.xml to another name, a JSESSIONID is still generated, and the new cookie becomes secure.
- Is there something else generating this cookie?
- Why isn't weblogic able to secure the JSESSIONID or even change its path (changing cookie-path results in two JESSIONID cookies being sent)?
Has anyone tried this earlier, Please share your thoughts.