[ 
https://issues.apache.org/jira/browse/MYFACES-4417?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17449237#comment-17449237
 ] 

Thomas Andraschko commented on MYFACES-4417:
--------------------------------------------

the config org.apache.myfaces.FLASH_SCOPE_DISABLED works fine in my applications
if you can create a reproducer (a forked primefaces-test is create - we can run 
with different JSF impls on jetty) and create a new myfaces issue

> Support for Same Site and HSTS
> ------------------------------
>
>                 Key: MYFACES-4417
>                 URL: https://issues.apache.org/jira/browse/MYFACES-4417
>             Project: MyFaces Core
>          Issue Type: Bug
>          Components: General
>    Affects Versions: 2.3.9
>         Environment: Redhat Linux
>            Reporter: Andrew Charles Cilia
>            Priority: Major
>
> Security Auditors have identified that Session Cookies 
> oam.Flash.RENDERMAP.TOKEN and other Myfaces cookies are not handling Same 
> Site and HTTP Strict Transport Security. I am unfortunately not knowledgeable 
> enough to respond to this athough I have browsed and cannot see any 
> references to these security measures in the context of myfaces. 
> Is this handled by some version of myfaces?
> If not, is it something that is in the pipeline?
> If not in the pipeline, can I find some explanation somewhere that states 
> that it is unnecessary?
>  
> Regards
>  
>  



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to