[
https://issues.apache.org/jira/browse/MYFACES-4417?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17449237#comment-17449237
]
Thomas Andraschko commented on MYFACES-4417:
--------------------------------------------
the config org.apache.myfaces.FLASH_SCOPE_DISABLED works fine in my applications
if you can create a reproducer (a forked primefaces-test is create - we can run
with different JSF impls on jetty) and create a new myfaces issue
> Support for Same Site and HSTS
> ------------------------------
>
> Key: MYFACES-4417
> URL: https://issues.apache.org/jira/browse/MYFACES-4417
> Project: MyFaces Core
> Issue Type: Bug
> Components: General
> Affects Versions: 2.3.9
> Environment: Redhat Linux
> Reporter: Andrew Charles Cilia
> Priority: Major
>
> Security Auditors have identified that Session Cookies
> oam.Flash.RENDERMAP.TOKEN and other Myfaces cookies are not handling Same
> Site and HTTP Strict Transport Security. I am unfortunately not knowledgeable
> enough to respond to this athough I have browsed and cannot see any
> references to these security measures in the context of myfaces.
> Is this handled by some version of myfaces?
> If not, is it something that is in the pipeline?
> If not in the pipeline, can I find some explanation somewhere that states
> that it is unnecessary?
>
> Regards
>
>
--
This message was sent by Atlassian Jira
(v8.20.1#820001)