-
Hi, I customized the freppledb/output/commands.py to apply multiprocessing for exporting operationplan based on frepple:6.19.0, and I found the vulnerability using Fortify as below: Django Bad Practices: Cookie Stored Sessions on freppledb/settings.py: 171 Could anybody give me some suggestion for fixing this vulnerability? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Django has multiple session backends you can choose from. You're free to choose a different implementation to handle sessions. The frepple default will stay on with cookie-based sessions. Curious for the reasons why fortify consider this bad, google found me this page: |
Beta Was this translation helpful? Give feedback.
Django has multiple session backends you can choose from.
Frepple doesn't customize any of the session functionality, so using a different session backend one should be pretty easy: https://docs.djangoproject.com/en/3.2/topics/http/sessions/
You're free to choose a different implementation to handle sessions. The frepple default will stay on with cookie-based sessions.
Curious for the reasons why fortify consider this bad, google found me this page:
https://vulncat.fortify.com/en/detail?id=desc.structural.python.django_bad_practices_cookie_stored_sessions
The arguments 1 & 2 are not big issues when using https and mode…