Skip to content

Vulnerability scan that got Django Bad Practices using Fortify #522

Answered by jdetaeye
sgfisme asked this question in Q&A
Discussion options

You must be logged in to vote

Could anybody give me some suggestion for fixing this vulnerability?

Django has multiple session backends you can choose from.
Frepple doesn't customize any of the session functionality, so using a different session backend one should be pretty easy: https://docs.djangoproject.com/en/3.2/topics/http/sessions/

You're free to choose a different implementation to handle sessions. The frepple default will stay on with cookie-based sessions.

Curious for the reasons why fortify consider this bad, google found me this page:
https://vulncat.fortify.com/en/detail?id=desc.structural.python.django_bad_practices_cookie_stored_sessions
The arguments 1 & 2 are not big issues when using https and mode…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by sgfisme
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants