Adobe ColdFusion 11 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- CF11-01-000001
- Vuln IDs
-
- V-62075
- Rule IDs
-
- SV-76565r1_rule
Checks: C-62879r2_chk
Within the Administrator Console, navigate to the "Administrator" settings under the "Security" menu. If the setting "Allow concurrent login sessions for Administrator Console" is checked, this is a finding.
Fix: F-67995r1_fix
Within the Administrator Console, navigate to the "Administrator" settings under the "Security" menu. To disable concurrent logins, uncheck the "Allow concurrent login sessions for Administrator Console" setting and select the "Submit Changes" button.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- CF11-01-000004
- Vuln IDs
-
- V-62349
- Rule IDs
-
- SV-76839r1_rule
Checks: C-63153r1_chk
Access the "PDF Service" page under the "Data & Services" menu within the Administrator Console. If there are no PDF Service Managers defined, the finding is not applicable. If any PDF Service Managers listed have "Https Enabled" set to "NO", this is a finding.
Fix: F-68269r1_fix
If there are no PDF Service Managers in use, the finding is not applicable. Access the "PDF Service" page under the "Data & Services" menu within the Administrator Console. Edit each service and check the "Https Enabled" option.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001453
- Version
- CF11-01-000005
- Vuln IDs
-
- V-62351
- Rule IDs
-
- SV-76841r1_rule
Checks: C-63155r1_chk
Review the setting "JVM arguments" within the Administrator Console. These arguments can be found in the "Java and JVM" page accessed through the "Server Settings" menu option. The parameter -Dhttps.protocols is used to set the TLS versions that the JVM can use. Valid values for this setting must be TLS versions 1.0 or higher. An example setting to use TLS versions 1.2, 1.1 and 1.0 is -Dhttps.protocols=TLSv1.2,TLSv1.1,TLSv1 and an example to only use TLS version 1.2 is -Dhttps.protocols=TLSv1.2 If the "JVM arguments" setting does not contain the parameter -Dhttps.protocols or if the parameter -Dhttps.protocols contains any SSL versions, this is a finding.
Fix: F-68271r1_fix
Navigate to the "JVM arguments" setting within the Administrator Console. These arguments can be found in the "Java and JVM" page accessed through the "Server Settings" menu option. Add the parameter -Dhttps.protocols and set the parameter to the TLS versions to be used. A sample setting to use TLSv1.2, TLSv1.1 and TLSv1 is - Dhttps.protocols=TLSv1.2,TLSv1.1,TLSv1. SSL versions must not be added to this parameter. Once the parameter is added to the JVM arguments, select the "Submit Changes" button to save the changes and restart the ColdFusion application server to have the changes take effect.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- CF11-01-000007
- Vuln IDs
-
- V-62353
- Rule IDs
-
- SV-76843r1_rule
Checks: C-63157r1_chk
Within the Administrator Console, navigate to the "User Manager" page under the "Security" menu. Review the roles assigned to each user against the ISSM approved list of user accounts and roles to determine if any user has excessive authorization. If any user has roles assigned that are not approved by the ISSM, this is a finding.
Fix: F-68273r1_fix
Navigate to the "User Manager" page under the "Security" menu and review the roles assigned to each user. Enable only those roles for each user approved by the ISSO/ISSM.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- CF11-01-000010
- Vuln IDs
-
- V-62355
- Rule IDs
-
- SV-76845r1_rule
Checks: C-63159r1_chk
Within the Administrator Console, navigate to the "Memory Variables" page under the "Server Settings" menu. If the "Session Variables" setting under the "Default Timeout" section is set greater than 15 minutes, this is a finding.
Fix: F-68275r1_fix
Navigate to the "Memory Variables" page under the "Server Settings" menu. Set the "Session Variables" setting under the "Default Timeout" section to 15 minutes or less and select the "Submit Changes" button.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- CF11-01-000011
- Vuln IDs
-
- V-62357
- Rule IDs
-
- SV-76847r1_rule
Checks: C-63161r1_chk
Within the Administrator Console, navigate to the "Memory Variables" page under the "Server Settings" menu. If the "Session Variables" setting under the "Maximum Timeout" section is set greater than "1" hour, this is a finding.
Fix: F-68277r1_fix
Navigate to the "Memory Variables" page under the "Server Settings" menu. Set the "Session Variables" setting under the "Maximum Timeout" section to "1" hour or less and select the "Submit Changes" button.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- CF11-01-000016
- Vuln IDs
-
- V-62359
- Rule IDs
-
- SV-76849r1_rule
Checks: C-63163r1_chk
Within the Administrator Console, navigate to the "Allowed IP Addresses" page under the "Security" menu. If the list of allowed IP addresses for accessing the ColdFusion Administrator is blank, is set to "*.*.*.*" or contains IP addresses/subnets that should not have access, this is a finding.
Fix: F-68279r1_fix
Navigate to the "Allowed IP Addresses" page under the "Security" menu. Set the list of allowed IP addresses for accessing ColdFusion Administrator to only those IP addresses or subnets that should be capable of reaching the Administrator Console.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- CF11-01-000017
- Vuln IDs
-
- V-62361
- Rule IDs
-
- SV-76851r1_rule
Checks: C-63165r1_chk
Within the Administrator Console, navigate to the "Allowed IP Addresses" page under the "Security" menu. If there are any entries in the "Allowed IP Addresses for Exposed Services" section, validate with the SA that the IP addresses and subnets specified require access. If any of the IP addresses or subnets specified do not require access, this is a finding.
Fix: F-68281r1_fix
Navigate to the "Allowed IP Addresses" page under the "Security" menu. Remove all entries from the list under the "Allowed IP Addresses for Exposed Services" section that do not require access to ColdFusion services.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- CF11-01-000018
- Vuln IDs
-
- V-62363
- Rule IDs
-
- SV-76853r1_rule
Checks: C-63167r1_chk
Within the Administrator Console, navigate to the "User Manager" page under the "Security" menu. Review each defined user by using the edit function. For each user that has values for "Allowed Services", validate with the SA that the user should have remote access to each service. If there are any users with services that are not required to perform the users' duties, this is a finding.
Fix: F-68283r1_fix
Navigate to the "User Manager" page under the "Security" menu. Only assign services to those users who require access and only assign those services that are required to perform the user's duties.
- RMF Control
- AU-10
- Severity
- H
- CCI
- CCI-000166
- Version
- CF11-02-000030
- Vuln IDs
-
- V-62365
- Rule IDs
-
- SV-76855r1_rule
Checks: C-63169r1_chk
Access the "Administrator" page under the "Security" menu within the Administrator Console. If the "Separate user name and password authentication" is not selected, this is a finding.
Fix: F-68285r1_fix
Access the "Administrator" page under the "Security" menu within the Administrator Console. Select "Separate user name and password authentication" and select the "Submit Changes" button.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- CF11-02-000031
- Vuln IDs
-
- V-62367
- Rule IDs
-
- SV-76857r1_rule
Checks: C-63171r1_chk
Review the users within the "User Manager" page under the "Security" menu. If users are not defined, this is a finding.
Fix: F-68287r1_fix
Create user accounts within the "User Manager" page under the "Security" menu for those users that need access to the Administrator Console.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- CF11-02-000032
- Vuln IDs
-
- V-62369
- Rule IDs
-
- SV-76859r1_rule
Checks: C-63173r1_chk
Determine if ColdFusion is part of a clustered environment by accessing the "Instance Manager" and the "Cluster Manager" settings under the "Enterprise Manager" menu within the Administrator Console. If ColdFusion is not setup in a clustered configuration, this finding is not applicable. Ask the SA if a log record aggregation tool is being used to compile the log records from the ColdFusion application servers within the cluster for storage and review. If the log records are not being aggregated, this is a finding.
Fix: F-68289r1_fix
Implement a strategy to aggregate the log data from the ColdFusion application servers within the cluster for system-wide log trail storage and review.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- CF11-02-000034
- Vuln IDs
-
- V-62371
- Rule IDs
-
- SV-76861r1_rule
Checks: C-63175r1_chk
Review the roles assigned to the defined users within the "User Manager" page under the "Security" menu. Only the ISSM, or users appointed by the ISSM to change logable events, may have the following roles: Debugging and Logging>Logging Debugging and Logging>Code Analyzer Debugging and Logging>Debugging Debugging and Logging>License Scanner Debugging and Logging>System Probes If any other users have any of these roles, then this is a finding.
Fix: F-68291r1_fix
Navigate to the "User Manager" page under the "Security" menu and assign the following roles to the ISSM and users appointed by the ISSM to change logable events. Debugging and Logging>Logging Debugging and Logging>Code Analyzer Debugging and Logging>Debugging Debugging and Logging>License Scanner Debugging and Logging>System Probes
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000132
- Version
- CF11-02-000040
- Vuln IDs
-
- V-62373
- Rule IDs
-
- SV-76863r1_rule
Checks: C-63177r1_chk
Within the Administrator Console, navigate to the "Logging Settings" page under the "Debugging & Logging" menu. If "Enable logging for scheduled tasks" is not checked, this is a finding.
Fix: F-68293r1_fix
Navigate to the "Logging Settings" page under the "Debugging & Logging" menu. Check "Enable logging for scheduled tasks" and select the "Submit Changes" button.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- CF11-02-000049
- Vuln IDs
-
- V-62375
- Rule IDs
-
- SV-76865r1_rule
Checks: C-63179r1_chk
Review the roles assigned to the defined users within the "User Manager" page under the "Security" menu. Only users given the responsibility to read logs should have the following role assigned: Debugging and Logging>Logging If any user, other than those assigned to read logs, is assigned this role, this is a finding.
Fix: F-68295r1_fix
Enable the Debugging and Logging>Logging role for those users that require the ability to read log files. This parameter is set in the "User Manager" page under the "Security" menu.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- CF11-02-000050
- Vuln IDs
-
- V-62377
- Rule IDs
-
- SV-76867r1_rule
Checks: C-63181r1_chk
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log files should have the following permissions: ColdFusion running on Windows should have Full control for the Administrators group and the user running ColdFusion. ColdFusion running on Linux should have the permissions set to "750" or more restrictive. If the permissions are not set correctly for the log directory and log files, this is a finding.
Fix: F-68297r1_fix
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log file permissions can be set by: ColdFusion running on Windows 1. Right click on the logs directory for ColdFusion and select "Properties". 2. Click on the "Security" tab and then click the "Advanced" button. 3. On the "Permissions" tab, click the "Disable inheritance" button and select "Remove all inherited permissions from this object." 4. Click the "Add" button, in the permission Entry dialog, click "Select a principal." 5. Enter the user that is running the ColdFusion service and give this user Full control and click "OK" to save. 6. Click the "Add" button again, in the permission Entry dialog, click "Select a principal." 7. Enter the Administrators group and give the group Full control and click "OK" to save. 8. Check the checkbox to "Replace all child object permission entries with inheritable permission entries from this object". 9. Click "OK" to apply these permissions. ColdFusion running on Linux Use the chmod command to set the permissions correctly. For example, if the log directory is located at /opt/cf11/cfusion/logs, the command would be: chmod -R 750 /opt/cf11/cfusion/logs
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- CF11-02-000051
- Vuln IDs
-
- V-62379
- Rule IDs
-
- SV-76869r1_rule
Checks: C-63183r1_chk
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log files should have the following permissions: ColdFusion running on Windows should have Full control for the Administrators group and the user running ColdFusion. ColdFusion running on Linux should have the permissions set to "750" or more restrictive. If the permissions are not set correctly for the log directory and log files, this is a finding.
Fix: F-68299r1_fix
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log file permissions can be set by: ColdFusion running on Windows 1. Right click on the logs directory for ColdFusion and select "Properties". 2. Click on the "Security" tab and then click the "Advanced" button. 3. On the "Permissions" tab, click the "Disable inheritance" button and select "Remove all inherited permissions from this object." 4. Click the "Add" button, in the permission Entry dialog, click "Select a principal." 5. Enter the user that is running the ColdFusion service and give this user Full control and click "OK" to save. 6. Click the "Add" button again, in the permission Entry dialog, click "Select a principal." 7. Enter the Administrators group and give the group Full control and click "OK" to save. 8. Check the checkbox to "Replace all child object permission entries with inheritable permission entries from this object." 9. Click "OK" to apply these permissions. ColdFusion running on Linux Use the chmod command to set the permissions correctly. For example, if the log directory is located at /opt/cf11/cfusion/logs, the command would be: chmod -R 750 /opt/cf11/cfusion/logs
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- CF11-02-000052
- Vuln IDs
-
- V-62381
- Rule IDs
-
- SV-76871r1_rule
Checks: C-63185r1_chk
Review the roles assigned to the defined users within the "User Manager" page under the "Security" menu. Only users given the responsibility to delete logs should have the Debugging and Logging>Logging role assigned. If any user, other than those assigned the capability to delete logs, is assigned this role, this is a finding.
Fix: F-68301r1_fix
Enable the Debugging and Logging>Logging role for those users that require the ability to delete log files. This parameter is set in the "User Manager" page under the "Security" menu.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- CF11-02-000053
- Vuln IDs
-
- V-62383
- Rule IDs
-
- SV-76873r1_rule
Checks: C-63187r1_chk
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log files should have the following permissions: ColdFusion running on Windows should have full control for the Administrators group and the user running ColdFusion. ColdFusion running on Linux should have the permissions set to "750" or more restrictive. If the permissions are not set correctly for the log directory and log files, this is a finding.
Fix: F-68303r1_fix
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log file permissions can be set by: ColdFusion running on Windows: 1. Right click on the logs directory for ColdFusion and select "Properties". 2. Click on the "Security" tab and then click the "Advanced" button. 3. On the "Permissions" tab, click the "Disable inheritance" button and select "Remove all inherited permissions from this object." 4. Click the "Add" button, in the permission Entry dialog, click "Select a principal." 5. Enter the user that is running the ColdFusion service and give this user Full control and click "OK" to save. 6. Click the "Add" button again, in the permission Entry dialog, click "Select a principal." 7. Enter the Administrators group and give the group Full control and click "OK" to save. 8. Check the checkbox to "Replace all child object permission entries with inheritable permission entries from this object." 9. Click "OK" to apply these permissions. ColdFusion running on Linux: Use the chmod command to set the permissions correctly. For example, if the log directory is located at /opt/cf11/cfusion/logs, the command would be: chmod -R 750 /opt/cf11/cfusion/logs
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- CF11-02-000057
- Vuln IDs
-
- V-62385
- Rule IDs
-
- SV-76875r1_rule
Checks: C-63189r1_chk
This feature is not present when ColdFusion is installed on Windows; therefore, this finding is not applicable. Within the Administrator Console, navigate to the "Logging Settings" page under the "Debugging & Logging" menu. If "Use operating system logging facilities" is not checked, this is a finding.
Fix: F-68305r1_fix
Navigate to the "Logging Settings" page under the "Debugging & Logging" menu. Check "Use operating system logging facilities" and select the "Submit Changes" button.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- CF11-02-000064
- Vuln IDs
-
- V-62387
- Rule IDs
-
- SV-76877r1_rule
Checks: C-63191r1_chk
Locate the log file directory by viewing the "Log directory" setting within the "Logging Settings" page under the "Debugging & Logging" menu. Also make note of the "Maximum number of archives" and "Maximum file size (in kilobytes)" settings. Next, view the number of log files generated. This can be found by accessing the "Log Files" page under the "Debugging & Logging" menu. Count the number of log files. If "Maximum number of archives" multiplied by "Maximum file size (in kilobytes)" multiplied by the number of log files is larger than the storage where the log directory is located, this is a finding.
Fix: F-68307r1_fix
Move the location of the log files to a directory that has sufficient storage to meet the organization-defined log record storage requirement.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- CF11-02-000065
- Vuln IDs
-
- V-62389
- Rule IDs
-
- SV-76879r1_rule
Checks: C-63193r1_chk
Locate the log file directory by viewing the "Log directory" setting within the "Logging Settings" page under the "Debugging & Logging" menu. Have the administrator show the scheduled task or log management application that accesses this directory and stores the log files to another system or media. If the administrator cannot demonstrate that the log files are being stored to another system or media, this is a finding.
Fix: F-68309r1_fix
Configure a scheduled task or log management application to store the log files to another system or media.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- CF11-02-000079
- Vuln IDs
-
- V-62391
- Rule IDs
-
- SV-76881r1_rule
Checks: C-63195r1_chk
Interview the administrator to determine whether or not ColdFusion logs are transferred to another system weekly for standalone systems and simultaneously for interconnected systems. If the logs are not transferred weekly for standalone systems and simultaneously for interconnected systems, this is a finding.
Fix: F-68311r1_fix
Implement a strategy that transfers logs weekly for standalone systems and simultaneously for interconnected systems.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- CF11-02-000080
- Vuln IDs
-
- V-62393
- Rule IDs
-
- SV-76883r1_rule
Checks: C-63197r1_chk
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log files should have the following permissions: ColdFusion running on Windows should have Full control for the Administrators group and the user running ColdFusion. No other users should have permissions. ColdFusion running on Linux must have group ownership set to "root" and the owner set to the user running ColdFusion. If the ownership of the log directory and log files is incorrect, this is a finding.
Fix: F-68313r1_fix
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log file permissions can be set by: ColdFusion running on Windows: 1. Right click on the logs directory for ColdFusion and select "Properties". 2. Click on the "Security" tab and then click the "Advanced" button. 3. On the "Permissions" tab, click the "Disable inheritance" button and select "Remove all inherited permissions from this object." 4. Click the "Add" button, in the permission Entry dialog, click "Select a principal." 5. Enter the user that is running the ColdFusion service and give this user Full control and click "OK" to save. 6. Click the "Add" button again, in the permission Entry dialog, click "Select a principal." 7. Enter the Administrators group and give the group Full control and click "OK" to save. 8. Check the checkbox to "Replace all child object permission entries with inheritable permission entries from this object." 9. Click "OK" to apply these permissions. ColdFusion running on Linux: Use the chown command to set the owner and group. For example, if the log directory is located at /opt/cf11/cfusion/logs and the owner is to be cfuser, the command would be: chown -R cfuser:root /opt/cf11/cfusion/logs
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- CF11-02-000081
- Vuln IDs
-
- V-62395
- Rule IDs
-
- SV-76885r1_rule
Checks: C-63199r1_chk
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log files should have the following permissions: ColdFusion running on Windows should have full control for the Administrators group and the user running ColdFusion. No other users should have permissions. ColdFusion running on Linux must have group ownership set to "root" and the owner set to the user running ColdFusion. If the ownership of the log directory and log files is incorrect, this is a finding.
Fix: F-68315r1_fix
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log file permissions can be set by: ColdFusion running on Windows: 1. Right click on the logs directory for ColdFusion and select "Properties". 2. Click on the "Security" tab and then click the "Advanced" button. 3. On the "Permissions" tab, click the "Disable inheritance" button and select "Remove all inherited permissions from this object." 4. Click the "Add" button, in the permission Entry dialog, click "Select a principal." 5. Enter the user that is running the ColdFusion service and give this user Full control and click "OK" to save. 6. Click the "Add" button again, in the permission Entry dialog, click "Select a principal." 7. Enter the Administrators group and give the group Full control and click "OK" to save. 8. Check the checkbox to "Replace all child object permission entries with inheritable permission entries from this object." 9. Click "OK" to apply these permissions. ColdFusion running on Linux: Use the chown command to set the owner and group. For example, if the log directory is located at /opt/cf11/cfusion/logs and the owner is to be cfuser, the command would be: chown -R cfuser:root /opt/cf11/cfusion/logs
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- CF11-02-000082
- Vuln IDs
-
- V-62397
- Rule IDs
-
- SV-76887r1_rule
Checks: C-63201r1_chk
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log files should have the following permissions: ColdFusion running on Windows should have full control for the Administrators group and the user running ColdFusion. No other users should have permissions. ColdFusion running on Linux must have group ownership set to "root" and the owner set to the user running ColdFusion. If the ownership of the log directory and log files is incorrect, this is a finding.
Fix: F-68317r1_fix
Locate the logs directory for ColdFusion. The location can be found in the Administrator Console within the "Logging Settings" page under the "Debugging & Logging" menu. The log directory and log file permissions can be set by: ColdFusion running on Windows: 1. Right click on the logs directory for ColdFusion and select "Properties". 2. Click on the "Security" tab and then click the "Advanced" button. 3. On the "Permissions" tab, click the "Disable inheritance" button and select "Remove all inherited permissions from this object." 4. Click the "Add" button, in the permission Entry dialog, click "Select a principal." 5. Enter the user that is running the ColdFusion service and give this user Full control and click "OK" to save. 6. Click the "Add" button again, in the permission Entry dialog, click "Select a principal." 7. Enter the Administrators group and give the group Full control and click "OK" to save. 8. Check the checkbox to "Replace all child object permission entries with inheritable permission entries from this object." 9. Click "OK" to apply these permissions. ColdFusion running on Linux: Use the chown command to set the owner and group. For example, if the log directory is located at /opt/cf11/cfusion/logs and the owner is to be cfuser, the command would be: chown -R cfuser:root /opt/cf11/cfusion/logs
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- CF11-03-000091
- Vuln IDs
-
- V-62399
- Rule IDs
-
- SV-76889r1_rule
Checks: C-63203r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If "Disable access to internal ColdFusion Java components" is unchecked, this is a finding.
Fix: F-68319r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Check "Disable access to internal ColdFusion Java components" and select the "Submit Changes" button.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- CF11-03-000092
- Vuln IDs
-
- V-62401
- Rule IDs
-
- SV-76891r1_rule
Checks: C-63205r5_chk
Within the Administrator Console, navigate to the "User Manager" page under the "Security" menu. Review each defined user and ask the SA if the user should have access to server patch management functions. For each user that should not be able to access patch management functions, review the roles assigned to the user account. If the user has the "Server Updates" role, this is a finding.
Fix: F-68321r1_fix
Navigate to the "User Manager" page under the "Security" menu. Remove the "Server Updates" role from each user that should not have access to patch management functions.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- CF11-03-000093
- Vuln IDs
-
- V-62403
- Rule IDs
-
- SV-76893r1_rule
Checks: C-63207r1_chk
Locate the hf-updates directory for ColdFusion. Review the permissions on the hf-updates directory. ColdFusion running on Windows should have full control for the Administrators group and the user running the ColdFusion application. No other users or groups should have permissions. If permissions are granted to other users or groups, this is a finding. If ColdFusion is installed on Linux, the permissions must be "750" or more restrictive with the owner set to the user running the ColdFusion service and a group of root. If the permissions are more permissive, this is a finding.
Fix: F-68323r1_fix
Locate the hf-updates directory for ColdFusion. The hf-updates directory should have the following permissions: ColdFusion running on Windows: 1. Right click on the "hf-updates" directory and select "Properties". 2. Click on the "Security" tab and then click the "Advanced" button. 3. On the "Permissions" tab, click the "Disable inheritance" button and select "Remove all inherited permissions from this object." 4. Click the "Add" button, in the permission Entry dialog, click "Select a principal." 5. Enter the user that is running the ColdFusion service and give this user Full control and click "OK" to save. 6. Click the "Add" button again, in the permission Entry dialog, click "Select a principal." 7. Enter the Administrators group and give the group Full control and click "OK" to save. 8. Check the checkbox to "Replace all child object permission entries with inheritable permission entries from this object." 9. Click "OK" to apply these permissions. ColdFusion running on Linux: Use the chmod command to set the permissions correctly and chown to set the owner and group. For example, if the hf-updates directory is found at /opt/cf11/cfusion/hf-updates and you want to set the owner to cfuser, the commands would be: chown cfuser:root /opt/cf11/cfusion/hf-updates chmod 750 /opt/cf11/cfusion/hf-updates
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- CF11-03-000096
- Vuln IDs
-
- V-62405
- Rule IDs
-
- SV-76895r1_rule
Checks: C-63209r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If "Allowed file extensions for CFInclude tag" is empty, this is not a finding. If the "Allowed file extensions for CFInclude tag" contains the wildcard string "*.*" or if the list of file extensions is not the list approved by the ISSO, this is a finding.
Fix: F-68325r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Enter the list of approved file extensions in the "Allowed file extensions for CFInclude tag" field and select the "Submit Changes" button. A blank list will only allow cfm and cfml files to be included and fulfills this requirement.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- CF11-03-000097
- Vuln IDs
-
- V-62407
- Rule IDs
-
- SV-76897r1_rule
Checks: C-63211r1_chk
Ask the administrator if ColdFusion server monitoring is being used or if flex remoting is being used by any hosted applications. If ColdFusion server monitoring is being used or hosted applications are using flash remoting, this is not a finding. Within the Administrator Console, navigate to the "Flex Integration" page under the "Data & Services" menu. If the "Enable Flash Remoting" option is checked, this is a finding.
Fix: F-68327r1_fix
Navigate to the "Flex Integration" page under the "Data & Services" menu. Uncheck the "Enable Flash Remoting" option and select the "Submit Changes" button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- CF11-03-000098
- Vuln IDs
-
- V-62409
- Rule IDs
-
- SV-76899r1_rule
Checks: C-63213r1_chk
Ask the administrator if the in-memory file system is being used by any hosted applications. If hosted applications are using the in-memory file system, this is not a finding. Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If "Enable In-Memory File System" is checked, this is a finding.
Fix: F-68329r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Uncheck "Enable In-Memory File System" and select the "Submit Changes" button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- CF11-03-000099
- Vuln IDs
-
- V-62411
- Rule IDs
-
- SV-76901r1_rule
Checks: C-63215r1_chk
Ask the administrator if Event Gateway services are being used by any hosted applications. If hosted applications are using the service, this is not a finding. Within the Administrator Console, navigate to the "Settings" page under the "Event Gateways" menu. If "Enable ColdFusion Event Gateway Services" is checked, this is a finding.
Fix: F-68331r1_fix
Navigate to the "Settings" page under the "Event Gateway" menu. Uncheck "Enable ColdFusion Event Gateway Services" and select the "Submit Changes" button.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- CF11-03-000100
- Vuln IDs
-
- V-62413
- Rule IDs
-
- SV-76903r1_rule
Checks: C-63217r1_chk
Within the Administrator Console, navigate to the "RDS" page under the "Security" menu. If "Enable RDS Service" is checked, this is a finding.
Fix: F-68333r1_fix
Navigate to the "RDS" page under the "Security" menu. Uncheck "Enable RDS Service" and select the "Submit Changes" button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- CF11-03-000101
- Vuln IDs
-
- V-62415
- Rule IDs
-
- SV-76905r1_rule
Checks: C-63219r1_chk
Ask the administrator if LiveCycle Data Services ES are being used by any hosted applications. If hosted applications are using the service, this is not a finding. Within the Administrator Console, navigate to the "Flex Integration" page under the "Data & Services" menu. If "Enable Remote Adobe LiveCycle Data Management access" is checked, this is a finding.
Fix: F-68335r1_fix
Navigate to the "Flex Integration" page under the "Data & Services" menu. Uncheck "Enable Remote Adobe Live Cycle Data Management access" and select the "Submit Changes" button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- CF11-03-000102
- Vuln IDs
-
- V-62417
- Rule IDs
-
- SV-76907r1_rule
Checks: C-63221r1_chk
Ask the administrator if WebSocket services are being used by any hosted applications. If hosted applications are using the service, this is not a finding. Within the Administrator Console, navigate to the "WebSocket" page under the "Server Settings" menu. If "Enable WebSocket Service" is checked, this is a finding.
Fix: F-68337r1_fix
Navigate to the "WebSocket" page under the "Server Settings" menu. Uncheck "Enable WebSocket Service" and select the "Submit Changes" button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- CF11-03-000103
- Vuln IDs
-
- V-62419
- Rule IDs
-
- SV-76909r1_rule
Checks: C-63223r1_chk
Several sample services are installed with the ColdFusion server. From the Administrator Console, go to the "Data Sources" page under the "Data & Services" menu. If the data sources cfartgallery, cfbookclub, cfcodeexplorer, or cfdocexamples exist, this is a finding.
Fix: F-68339r1_fix
Remove the sample data sources by navigating to the "Data Sources" page under the "Data & Services" menu. Delete the data sources cfartgallery, cfbookclub, cfcodeexplorer, and cfdocexamples.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- CF11-03-000104
- Vuln IDs
-
- V-62421
- Rule IDs
-
- SV-76911r1_rule
Checks: C-63225r1_chk
Locate the server.xml file for ColdFusion. This file can usually be located under the ColdFusion installation directory under the runtime/conf directory for Linux and runtime\conf for Windows. Within the server.xml file, locate the xml line: <Connector executor="tomcatThreadPool" maxThreads="50" port="8500" protocol="org.apache.coyote.http11.Http11Protocol" connectionTimeout="20000" redirectPort="8445" /> Note: port="8500" is the port the Administrator Console was hosted on. The port is defined during the install and can be changed from the default of 8500, so this parameter may be different if an alternate port was assigned. If the line exists and is not commented out (XML comments start with <!-- and end with -->, e.g., <!-- XML COMMENT -->), this is a finding.
Fix: F-68341r2_fix
Locate the server.xml file for ColdFusion. This file can usually be located under the ColdFusion installation directory under the runtime/conf directory for Linux and runtime\conf for Windows. After making a backup of this file, edit the file and locate the following xml line: <Connector executor="tomcatThreadPool" maxThreads="50" port="8500" protocol="org.apache.coyote.http11.Http11Protocol" connectionTimeout="20000" redirectPort="8445" /> Note: port="8500" is the port the Administrator Console was hosted on. The port is setup at install and can be changed, so this parameter may be different in this line. This line can be deleted or using XML syntax can be commented out of the configuration. XML comment syntax starts with <!-- and ends with -->, e.g., <!-- XML COMMENT -->.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- CF11-03-000105
- Vuln IDs
-
- V-62423
- Rule IDs
-
- SV-76913r1_rule
Checks: C-63227r1_chk
Within the Administrator Console, navigate to the "Remote Inspection Settings" page under the "Debugging & Logging" menu. If "Allow Remote Inspection" is checked, this is a finding.
Fix: F-68343r1_fix
Navigate to the "Remote Inspection Settings" page under the "Debugging & Logging" menu. Uncheck "Allow Remote Inspection" and select the "Submit Changes" button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- CF11-03-000106
- Vuln IDs
-
- V-62425
- Rule IDs
-
- SV-76915r1_rule
Checks: C-63229r1_chk
Within the Administrator Console, navigate to the "Memory Variables" page under the "Server Settings" menu. If "Disable updating ColdFusion internal cookies using ColdFusion tags/functions." is unchecked, this is a finding.
Fix: F-68345r1_fix
Navigate to the "Memory Variables" page under the "Server Settings" menu. Check "Disable updating ColdFusion internal cookies using ColdFusion tags/functions." and select the "Submit Changes" button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- CF11-03-000107
- Vuln IDs
-
- V-62427
- Rule IDs
-
- SV-76917r1_rule
Checks: C-63231r1_chk
Access the Administrator Console from a web browser. If a port is part of the URL, verify that the port used is an approved port. Within the Administrator Console, navigate to each page under the "Data & Services" menu viewing the port settings for each connection and service. If the Administrator Console or any "Data & Services" setting is not using an approved port, this is a finding.
Fix: F-68347r1_fix
Reconfigure the services or data connections that are using an unapproved port to use an approved port.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- CF11-03-000108
- Vuln IDs
-
- V-62429
- Rule IDs
-
- SV-76919r1_rule
Checks: C-63233r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If "Check configuration files for changes every" is checked, this is a finding.
Fix: F-68349r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Uncheck "Check configuration files for changes every" and select the "Submit Changes" button.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CF11-03-000110
- Vuln IDs
-
- V-62431
- Rule IDs
-
- SV-76921r1_rule
Checks: C-63235r2_chk
Locate the neo-security.xml file and locate the Root Administrator username. For ColdFusion running on Windows: 1. Open the neo-security.xml in notepad.exe (Hint: Turn Word Wrap on to make the file easier to read.). 2. Under the menu "Edit", select the "Find…" menu item. 3. In the "Find" window, put in the search text 'admin.userid.root'> including the single quotes. 4. The Root Administrator username follows this tag between the <string> and </string> tags. A sample entry may look like this if the Root Administrator username were Administrator: <var name='admin.userid.root'><string>Administrator</string> For ColdFusion running on Linux: 1. Change to the directory where the neo-security.xml file is located. 2. Execute the following command to return the Root Administrator username: cat neo-security.xml | grep –i –oP ‘admin.userid.root’+”’><string>\K\w+” If the Root Administrator username is any upper-and lower-case mix of characters for the words admin or administrator (e.g., admin, Admin, ADMIN, Administrator, ADMINISTRATOR, etc.), this is a finding.
Fix: F-68351r1_fix
Locate the neo-security.xml file and change to the directory where the file is located. Note: Make a backup of the file before making any modifications. For ColdFusion running on Windows: 1. Open the file neo-security.xml in notepad.exe (Hint: Turn Word Wrap on to make the file easier to read.). 2. Under the menu "Edit", select the "Find…" menu item. 3. In the "Find" window, put in the search text 'admin.userid.root'> including the single quotes. 4. The Root Administrator username follows this tag between the <string> and </string> tags. A sample entry may look like this if the Root Administrator username were Administrator: <var name='admin.userid.root'><string>Administrator</string> 5. Update the Root Administrator username. The new Root Administrator username must not be any upper and lower case mix of characters for the words admin or administrator, e.g., admin, Admin, ADMIN, Administrator, ADMINISTRATOR, etc. 6. Save the file. 7. Restart ColdFusion to have the new username take effect. Within a terminal window, change to the bin directory under the ColdFusion installation directory and execute the command: coldfusion -restart -console ColdFusion running on Linux: 1. Change to the directory where the neo-security.xml file is located. 2. Update the Root Administrator username by editing the neo-security.xml file. 3. Locate the <var name='admin.userid.root'> tag. The username is located in between the <string> and </string> tags that follow. A sample entry may look like this if the Root Administrator username were Administrator: <var name='admin.userid.root'><string>Administrator</string> 4. Update the Root Administrator username. The new Root Administrator username must not be any upper and lower case mix of characters for the words admin or administrator, e.g., admin, Admin, ADMIN, Administrator, ADMINISTRATOR, etc. 5. Save the file. 6. Restart ColdFusion to have the new username take effect. ColdFusion can be restarted by changing to the bin directory under the ColdFusion installation directory and execute the command: coldfusion restart Validate that the new username is being used and that the system is operating properly. Once validated, the backup neo-security.xml file must be deleted.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CF11-03-000111
- Vuln IDs
-
- V-62433
- Rule IDs
-
- SV-76923r1_rule
Checks: C-63237r1_chk
For ColdFusion running on Windows: 1. Run the snap-in services.msc. 2. Locate the ColdFusion section of services. 3. Right click on each ColdFusion service and select "Properties". 4. Select the "Log On" tab. If any service has "Local System account" selected, this is a finding. 5. View the groups for each user account that was used to run a ColdFusion service by running the snap-in compmgmt.msc. 6. Expand the "Local Users and Groups" in the left pane under "System Tools" to view the "Users" and "Groups" folders. 7. Select the "Users" folder and the users will be listed in the right pane. 8. Right click a user that runs a ColdFusion service. 9. Select "Properties" on the menu. 10. Select the "Member Of" tab. If any groups are listed, this is a finding. 11. Click on the "Remote Desktop Services Profile" tab. If the "Deny this user permissions to log on to Remote Desktop Session Host server" is not checked, this is a finding. 12 Repeat steps 8 through 11 for each user that runs a ColdFusion service. ColdFusion running on Linux: 1. Locate the file coldfusion_11 by running the command: find / -name coldfusion_11 2. Change to the directory where the file is located. 3. Execute the command: grep -i -m 1 runtime_user coldfusion_11 4. The user being used to execute ColdFusion will be listed. 5. View the user within the /etc/passwd file. 6. Make note of the user id and group id. For example, if the line in the passwd file is cfuser:x:500:501:ColdFusion:/home/cfuser:/sbin/nologin, the user id is 500 and the group id is 501. If the user id or the group id is set to 0 (zero), this is a finding.
Fix: F-68353r2_fix
For ColdFusion running on Windows: 1. Create a user for the ColdFusion services by running the snap-in compmgmt.msc. 2. Expand the "Local Users and Groups" in the left pane under "System Tools" to view the "Users" and "Groups" folders. 3. Select the "Users" folder. 4. Right click in the right pane and select "New User". 5. Enter a username and password for the user. Follow any organization specific policies in place and Windows STIGs for password complexity, usernames, etc. 6. Select the "Create" button to create the user. 7. Right click on the new user and select the "Properties" menu item. 8. Select the "Member Of" tab. 9. Remove all groups. 10. Select the "Remote Desktop Services Profile" tab. 11. Check the "Deny this user permissions to log on to Remote Desktop Session Host server" checkbox. 12. Select the "Apply" button. 13. Run the snap-in services.msc. 14. Locate the ColdFusion services. 15. Right click on a ColdFusion service and select "Properties". 16. Select the "Log On" tab. 17. Click on the "This account:" radio button. 18. Enter the username and password for the user account that was just created. 19. Select "Ok" to save the changes. 20. Repeat steps 15 through 19 for each ColdFusion service. ColdFusion running on Linux: 1. Create a group for the user account that will run the ColdFusion service by executing the command groupadd. For example, if the group being created is webusers, the command would be: groupadd webusers 2. Create the user account for the service by executing the command adduser. For example, if the user being created is cfuser with the group webusers, the command would be: adduser -g webusers -s /sbin/nologin -M -c ColdFusion cfuser 3. Assign a password to the account that follows any organization password policies in place and the OS STIG for password complexity. The password is assigned by executing the command: passwd cfuser 4. Locate the file coldfusion_11 by running the command: find / -name coldfusion_11 5. Change to the directory where the file is located. 6. Edit the coldfusion_11 file. 7. Locate the text RUNTIME_USER= within coldfusion_11 8. Update the user account being used to run the ColdFusion service.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CF11-03-000112
- Vuln IDs
-
- V-62435
- Rule IDs
-
- SV-76925r1_rule
Checks: C-63239r1_chk
Review the users within the "User Manager" page under the "Security" menu. If users exist that are not approved by the ISSM, this is a finding.
Fix: F-68355r1_fix
Navigate to the "User Manager" page under the "Security" menu. Modify the list of users to only contain those approved by the ISSM.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CF11-03-000113
- Vuln IDs
-
- V-62437
- Rule IDs
-
- SV-76927r1_rule
Checks: C-63241r1_chk
For ColdFusion running on Windows, this finding is not applicable. ColdFusion running on Linux: 1. Locate the file coldfusion_11 by running the command: find / -name coldfusion_11 2. Change to the directory where the file is located. 3. Edit the coldfusion_11 file. 4. Locate the umask setting. It should be located near the top of the file, but below the #description comment. If the umask is not set to 007 or more restrictive, this is a finding.
Fix: F-68357r1_fix
For ColdFusion running on Windows, this finding is not applicable. 1. Locate the file coldfusion_11 by running the command: find / -name coldfusion_11 2. Change to the directory where the file is located. 3. Edit the coldfusion_11 file. 4. Add the umask setting near the top of the file, but below the #description comment. A sample umask setting looks like: umask 007
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CF11-03-000114
- Vuln IDs
-
- V-62439
- Rule IDs
-
- SV-76929r1_rule
Checks: C-63243r1_chk
Within the Administrator Console, navigate to the "Sandbox Security" page under the "Security" menu. If "Enable ColdFusion Sandbox Security" is unchecked, this is a finding.
Fix: F-68359r1_fix
Navigate to the "Sandbox Security" page under the "Security" menu. Check "Enable ColdFusion Sandbox Security" and select the "Submit Changes" button.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CF11-03-000115
- Vuln IDs
-
- V-62441
- Rule IDs
-
- SV-76931r1_rule
Checks: C-63245r1_chk
Within the Administrator Console, navigate to the "Sandbox Security" page under the "Security" menu. Sandboxes should be setup for the Administrator Console and any other hosted applications. The Administrator Console must have its own sandbox separate from the other hosted applications. If there are no sandboxes implemented for the Administrator Console and the other hosted applications, this is a finding.
Fix: F-68361r1_fix
Navigate to the "Sandbox Security" page under the "Security" menu. Create sandboxes for the applications to operate within and select the "Submit Changes" button.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CF11-03-000116
- Vuln IDs
-
- V-62443
- Rule IDs
-
- SV-76933r1_rule
Checks: C-63247r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If the "Default ScriptSrc Directory" is set to /CFIDE/scripts/", this is a finding.
Fix: F-68363r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Enter the new location for the ScriptSrc Directory.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- CF11-03-000117
- Vuln IDs
-
- V-62445
- Rule IDs
-
- SV-76935r1_rule
Checks: C-63249r1_chk
Within the Administrator Console, navigate to the "Updates" page under the "Server Update" menu. If the "Available Updates" tab is showing that updates are available, this is a finding. A list of updates available can be retrieved from the update site. Enter the "Settings" tab and copy the URL listed in the "Site URL" field. Paste the URL into a browser and make note of the newest update available. If the "Site URL" field is empty or if a local update server is being used and the site does not list the updates, the ColdFusion update site can be reached at https://helpx.adobe.com/coldfusion/kb/coldfusion-11-updates.html Enter the "Installed Updates" tab and verify that the update installed is the latest listed on the update site. If the latest update is not installed, this is a finding.
Fix: F-68365r1_fix
Navigate to the "Update" page under the "Server Update" menu. Enter the "Available Updates" tab and install the latest patch available. If the ColdFusion server is patched from the command line and not through the ColdFusion Console, the latest patch must be downloaded manually, the hash value verified and then installed using the instructions provided with the patch.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- CF11-03-000118
- Vuln IDs
-
- V-62447
- Rule IDs
-
- SV-76937r1_rule
Checks: C-63251r1_chk
Several sample services are installed with the ColdFusion server. From the Administrator Console, go to the "ColdFusion Collections" page under the "Data & Services" menu. If the bookclub collection exists, this is a finding.
Fix: F-68367r1_fix
Remove the sample collections by navigating to the "ColdFusion Collections" page under the "Data & Services" menu. Delete the bookclub collection.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- CF11-03-000119
- Vuln IDs
-
- V-62449
- Rule IDs
-
- SV-76939r1_rule
Checks: C-63253r1_chk
Several sample services are installed with the ColdFusion server. From the Administrator Console, go to the "Gateway Instances" page under the "Event Gateways" menu. If the Gateway Instance SMS Menu App. exists, this is a finding.
Fix: F-68369r1_fix
Remove the sample gateway instances by navigating to the "Gateway Instances" page under the "Event Gateways" menu. Delete the Gateway Instance SMS Menu App.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- CF11-04-000128
- Vuln IDs
-
- V-62451
- Rule IDs
-
- SV-76941r1_rule
Checks: C-63255r1_chk
Within the Administrator Console, navigate to the "User Manager" page under the "Security" menu. If there are no defined users, this is a finding.
Fix: F-68371r1_fix
Navigate to the "User Manager" page under the "Security" menu. Create users that need access to the Administrator Console providing only the roles necessary to perform each job function.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- CF11-04-000129
- Vuln IDs
-
- V-62453
- Rule IDs
-
- SV-76943r1_rule
Checks: C-63257r1_chk
Determine if web services are published using the SOAP protocol to access sensitive data. This may be determined by interviewing the administrator or by reviewing hosted applications code, hosted application design documentation, published web services design documentation or ColdFusion baseline documentation. If web services are not published, this finding is not applicable. If web services are published, but the SOAP protocol is not used, this finding is not applicable. If web services are published and the SOAP protocol is used to access data, but the data is not sensitive, this finding is not applicable. Determine if the ws-security suite is in place to provide secure authentication to the sensitive data by interviewing the administrator or by reviewing hosted applications code, hosted application design documentation, published web services design documentation or ColdFusion baseline documentation. If web services are published using the SOAP protocol to access sensitive data and the ws-security suite is not used to secure the access, this is a finding.
Fix: F-68373r1_fix
If web services are not published, this finding is not applicable. If web services are published, but the SOAP protocol is not used, this finding is not applicable. If web services are published and the SOAP protocol is used to access data, but the data is not sensitive, this finding is not applicable. Install the ws-security suite to secure access to sensitive data.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- CF11-04-000133
- Vuln IDs
-
- V-62455
- Rule IDs
-
- SV-76945r1_rule
Checks: C-63259r1_chk
Within the Administrator Console, navigate to the "Flex Integration" page under the "Data & Services" menu. Ask the administrator if Flex is being used and if user credentials are being used for authentication. If user credentials are being used for Flex authentication to ColdFusion and "Enable RMI over SSL for Data Management" is not checked, this is a finding.
Fix: F-68375r1_fix
Navigate to the "Flex Integration" page under the "Data & Services" menu. Check "Enable RMI over SSL for Data Management" and select the "Submit Changes" button.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- CF11-04-000134
- Vuln IDs
-
- V-62457
- Rule IDs
-
- SV-76947r1_rule
Checks: C-63261r1_chk
Access the Administrator Console through a web browser. Look for indications that the communication is an https session through the prefix of https on the url and/or the lock icon, depending on the browser in use. If https does not appear to be in use, this is a finding.
Fix: F-68377r1_fix
Review the documentation for the web server where the Administrator Console is being hosted and setup https encryption to protect passwords during the authentication process.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- CF11-04-000135
- Vuln IDs
-
- V-62459
- Rule IDs
-
- SV-76949r1_rule
Checks: C-63263r2_chk
Within the Administrator Console, navigate to the "Mail" page under the "Server Settings" menu. If a user name and password are required for authentication and "Enable TLS connection to mail server" is unchecked and "Enable SSL socket connects to mail server" is unchecked, this is a finding.
Fix: F-68379r1_fix
Navigate to the "Mail" page under the "Server Settings" menu. Enable SSL/TLS by checking "Enable SSL socket connections to mail server" and/or "Enable TLS connection to mail server" options and select the "Submit Changes" button.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- CF11-04-000138
- Vuln IDs
-
- V-62461
- Rule IDs
-
- SV-76951r1_rule
Checks: C-63265r1_chk
Within the Administrator Console, navigate to the "Flex Integration" page under the "Data & Services" menu. If "Enable RMI over SSL for Data Management" is checked, make note of the path and filename of the keystore used. Navigate to the "WebSocket" page under the "Server Settings" menu. If "SSL Port" is checked, make note of the keystore path and filename. Review the permissions on the files designated in the keystore locations specified. ColdFusion running on Windows should have full control for the Administrators group and the user running ColdFusion on the keystore file. No other users should have permissions. If permissions are granted to other users or roles, this is a finding. If ColdFusion is installed on Linux, the permissions must be 750 or more restrictive with the owner set to the user running the ColdFusion service and a group of root. If the permissions are more permissive, this is a finding.
Fix: F-68381r2_fix
Locate the keystore file(s). The location can be found in the Administrator Console within the "Flex Integration" page under the "Data & Services" menu and within the "WebSocket" page under the "Server Settings" menu. The keystore(s) should have the following permissions: ColdFusion running on Windows: 1. Right click on the keystore and select "Properties". 2. Click on the "Security" tab and then click the "Advanced" button. 3. On the "Permissions" tab, click the "Disable inheritance" button and select "Remove all inherited permissions from this object." 4. Click the "Add" button, in the permission Entry dialog, click 'Select a principal." 5. Enter the user that is running the ColdFusion service and give this user Full control and click "OK" to save. 6. Click the "Add" button again, in the permission Entry dialog, click "Select a principal." 7. Enter the Administrators group and give the group Full control and click "OK" to save. 8. Check the checkbox to "Replace all child object permission entries with inheritable permission entries from this object." 9. Click "OK" to apply these permissions. ColdFusion running on Linux: Use the chmod command to set the permissions correctly and chown to set the owner and group. For example, if the keystore is named /opt/cf11/jre/lib/security/cacerts and you want to set the owner to cfuser, the commands would be: chown cfuser:root /opt/cf11/jre/lib/security/cacerts chmod 750 /opt/cf11/jre/lib/security/cacerts
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- CF11-05-000161
- Vuln IDs
-
- V-62463
- Rule IDs
-
- SV-76953r1_rule
Checks: C-63267r1_chk
Access the Administrator Console through a browser making note of the IP address that is used to access the console. Review the site's network diagram to validate that the IP used is on a management network and is separate from the public network. If the Administrator Console is not part of a management network, this is a finding.
Fix: F-68383r1_fix
Host the ColdFusion Administrator Console on a management network.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- CF11-05-000162
- Vuln IDs
-
- V-62465
- Rule IDs
-
- SV-76955r1_rule
Checks: C-63269r1_chk
Within the Administrator Console, navigate to the "Sandbox Security" page under the "Security" menu. If the Administrator Console is not hosted within a sandbox, this is a finding.
Fix: F-68385r1_fix
Navigate to the "Sandbox Security" page under the "Security" menu. Create sandbox for the Administrator Console to operate within and select the "Submit Changes" button.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- CF11-05-000163
- Vuln IDs
-
- V-62467
- Rule IDs
-
- SV-76957r1_rule
Checks: C-63271r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If "Disable creation of unnamed applications" is unchecked, this is a finding.
Fix: F-68387r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Check "Disable creation of unnamed applications" and select the "Submit Changes" button.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- CF11-05-000164
- Vuln IDs
-
- V-62469
- Rule IDs
-
- SV-76959r1_rule
Checks: C-63273r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If "Allow adding application variables to Servlet Context" is checked, this is a finding.
Fix: F-68389r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Uncheck "Allow adding application variables to Servlet Context" and select the "Submit Changes" button.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- CF11-05-000167
- Vuln IDs
-
- V-62471
- Rule IDs
-
- SV-76961r1_rule
Checks: C-63275r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If "Use UUID for cftoken" is not checked, this is a finding.
Fix: F-68391r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Check "Use UUID for cftoken" and select the "Submit Changes" button.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- CF11-05-000168
- Vuln IDs
-
- V-62473
- Rule IDs
-
- SV-76963r1_rule
Checks: C-63277r1_chk
Within the Administrator Console, navigate to the "Memory Variables" page under the "Server Settings" menu. If "Use J2EE session variables" is not checked, this is a finding.
Fix: F-68393r1_fix
Navigate to the "Memory Variables" page under the "Server Settings" menu. Check "Use J2EE session variables" and select the "Submit Changes" button.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- CF11-05-000169
- Vuln IDs
-
- V-62475
- Rule IDs
-
- SV-76965r1_rule
Checks: C-63279r1_chk
Within the Administrator Console, navigate to the "Memory Variables" page under the "Server Settings" menu. If "Cookie Timeout" is not set to -1, this is a finding.
Fix: F-68395r1_fix
Navigate to the "Memory Variables" page under the "Server Settings" menu. Set the parameter "Cookie Timeout" to -1 and select the "Submit Changes" button.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- CF11-05-000173
- Vuln IDs
-
- V-62477
- Rule IDs
-
- SV-76967r1_rule
Checks: C-63281r1_chk
This requirement is dependent upon system mission criticality. If the system is not mission critical and does not require redundancy, this finding is not applicable. Within the Administrator Console, navigate to the "Cluster Manager" under the "Enterprise Manager" menu. Verify that there are configured clusters with more than 1 server in each cluster. If there are no clusters defined or there is only one server in the cluster, this is a finding.
Fix: F-68397r1_fix
Navigate to the "Cluster Manager" under the "Enterprise Manager" menu. Create a cluster by defining a name and adding it to the configured clusters. Edit the cluster to add available servers to the cluster and submit the changes to the cluster.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- CF11-05-000178
- Vuln IDs
-
- V-62479
- Rule IDs
-
- SV-76969r1_rule
Checks: C-63283r1_chk
Locate the cacerts file for the JVM. This can be done using the appropriate find command for the OS and change to the directory where the cacerts file is located. To view the certificates stored within this file, execute the java command keytool -list -v -keystore ./cacerts and verify that the Certificate Authority (CA) for each certificate is DoD-approved. If any certificates have a CA that is not DoD-approved, this is a finding.
Fix: F-68399r2_fix
Locate the cacerts file for the JVM. This can be done using the appropriate find command for the OS and change to the directory where the cacerts file is located. Remove the certificates that have a CA that is non-DoD approved and import DoD CA-approved certificates.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000181
- Vuln IDs
-
- V-62481
- Rule IDs
-
- SV-76971r1_rule
Checks: C-63285r1_chk
If ColdFusion is not part of a mission critical system, this requirement is not applicable. Within the Administrator Console, navigate to the "Instance Manager" page under the "Enterprise Manager" menu. Validate that two or more servers have been defined and that the servers are on different hosts. If there are fewer than two servers available or the servers are on the same host, this is a finding. Navigate to the "Cluster Manager" page under the "Enterprise Manager" menu. If there are no clusters defined or any cluster has fewer than two servers in the cluster, this is a finding.
Fix: F-68401r1_fix
If ColdFusion is not part of a mission critical system, this requirement is not applicable. Within the Administrator Console, navigate to the "Instance Manager" page under the "Enterprise Manager" menu. Define two or more servers to be part of each cluster. Once the servers are defined for the cluster(s), navigate to the "Cluster Manager" page under the "Enterprise Manager" menu. Define clusters for your mission critical ColdFusion installation. Each defined cluster must contain two or more servers.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000182
- Vuln IDs
-
- V-62483
- Rule IDs
-
- SV-76973r1_rule
Checks: C-63287r1_chk
Within the Administrator Console, navigate to the "Client Variables" page under the "Server Settings" menu. If the default storage mechanism for client sessions is set to "Registry", this is a finding.
Fix: F-68403r1_fix
Navigate to the "Client Variables" page under the "Server Settings" menu. Set the default storage mechanism for client sessions to any available mechanism other than the registry and select the "Apply" button.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000183
- Vuln IDs
-
- V-62485
- Rule IDs
-
- SV-76975r1_rule
Checks: C-63289r1_chk
Within the Administrator Console, navigate to the "Request Tuning" page under the "Server Settings" menu. Ask the administrator if flash remoting is being used (Note: The Server Monitor feature in ColdFusion Enterprise makes use of flash remoting.). If flash remoting is being used, this finding is not applicable. If "Maximum number of simultaneous Flash Remoting requests" is not set to 1, this is a finding.
Fix: F-68405r1_fix
If flash remoting is being used, this finding is not applicable. Navigate to the "Request Tuning" page under the "Server Settings" menu. Set "Maximum number of simultaneous Flash Remoting requests" to 1 and select the "Submit Changes" button.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-002385
- Version
- CF11-05-000184
- Vuln IDs
-
- V-62487
- Rule IDs
-
- SV-76977r1_rule
Checks: C-63291r1_chk
Within the Administrator Console, navigate to the "Data Sources" page under the "Data & Services" Settings menu. If there are no data sources defined, this finding is not applicable. Edit each data source and then view the advanced settings by pressing the "Show Advanced Settings" button. If any of the data sources have CREATE, GRANT, DROP, REVOKE or ALTER checked, this is a finding.
Fix: F-68407r1_fix
If there are no data sources defined, this finding is not applicable. Navigate to the "Data Sources" page under the "Data & Services" Settings menu. Edit each data source and view the advanced settings. Uncheck the allow SQL of CREATE, GRANT, DROP, REVOKE and ALTER and select the "Submit" button.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000185
- Vuln IDs
-
- V-62489
- Rule IDs
-
- SV-76979r1_rule
Checks: C-63293r1_chk
Within the Administrator Console, navigate to the "Data Sources" page under the "Data & Services" Settings menu. If there are no data sources defined, this finding is not applicable. Edit each data source and then view the advanced settings by pressing the "Show Advanced Settings" button. Check to see if the data source has the capability to specify a query timeout. If available, this parameter must not be 0 (No Timeout). If a data source does not have this setting, then this is not a finding for this data source. If any of the data sources have a query timeout set to 0, this is a finding.
Fix: F-68409r1_fix
If there are no data sources defined, this finding is not applicable. Navigate to the "Data Sources" page under the "Data & Services" Settings menu. Edit each data source and view the advanced settings. If the data source has a query timeout parameter, set the timeout parameter to a value greater than 0 and select the "Submit" button.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000186
- Vuln IDs
-
- V-62491
- Rule IDs
-
- SV-76981r1_rule
Checks: C-63295r1_chk
Determine if web services are being published for the hosted applications. This may be determined by interviewing the administrator or by reviewing hosted applications code, hosted application design documentation, published web services design documentation or ColdFusion baseline documentation. If Web Services are being published for hosted applications, this find is not applicable. Within the Administrator Console, navigate to the "Request Tuning" page under the "Server Settings" menu. If Web Services are not being published for hosted applications and the "Maximum number of simultaneous CFC function requests" is not set to 1, this is a finding.
Fix: F-68411r1_fix
If Web Services are being published for hosted applications, this find is not applicable. Navigate to the "Request Tuning" page under the "Server Settings" menu. Set "Maximum number of simultaneous Web Service requests" to 1 and select the "Submit Changes" button.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000187
- Vuln IDs
-
- V-62493
- Rule IDs
-
- SV-76983r1_rule
Checks: C-63297r1_chk
Determine if CFC functions are being called directly from http/https for any hosted application. This may be determined by interviewing the administrator or by reviewing hosted applications code, hosted application design documentation or ColdFusion baseline documentation. If CFC requests are being used by hosted applications, this finding is not applicable. Within the Administrator Console, navigate to the "Request Tuning" page under the "Server Settings" menu. If the CFC requests are not being used b hosted applications and "Maximum number of simultaneous CFC function requests" is not set to 1, this is a finding.
Fix: F-68413r1_fix
If CFC requests are being used by hosted applications, this finding is not applicable. Navigate to the "Request Tuning" page under the "Server Settings" menu. Set "Maximum number of simultaneous CFC function requests" to 1 and select the "Submit Changes" button.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000188
- Vuln IDs
-
- V-62495
- Rule IDs
-
- SV-76985r1_rule
Checks: C-63299r1_chk
Within the Administrator Console, navigate to the "Request Tuning" page under the "Server Settings" menu. If "Maximum number of simultaneous Report threads" is not set to 1, this is a finding.
Fix: F-68415r1_fix
Navigate to the "Request Tuning" page under the "Server Settings" menu. Set "Maximum number of simultaneous Report threads" to 1 and select the "Submit Changes" button.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000189
- Vuln IDs
-
- V-62497
- Rule IDs
-
- SV-76987r1_rule
Checks: C-63301r1_chk
Within the Administrator Console, navigate to the "Request Tuning" page under the "Server Settings" menu. Ask the administrator if threading, calls to CFTHREAD, is being used by any of the hosted application. If threading is being used, this finding is not applicable. If threading is not being used and "Maximum number of threads available for CFTHREAD" is not set to 1, this is a finding.
Fix: F-68417r1_fix
If threading is being used, this finding is not applicable. Navigate to the "Request Tuning page under the Server Settings" menu. Set "Maximum number of threads available for CFTHREAD" to 1 and select the "Submit Changes" button.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000190
- Vuln IDs
-
- V-62499
- Rule IDs
-
- SV-76989r1_rule
Checks: C-63303r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If "Timeout Requests after seconds" is not checked or is set higher than 5, this is a finding.
Fix: F-68419r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Check "Timeout Requests after seconds" and set the value to 5 or less and select the "Submit Changes" button.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000191
- Vuln IDs
-
- V-62501
- Rule IDs
-
- SV-76991r1_rule
Checks: C-63305r1_chk
Within the Administrator Console, navigate to the "Data Sources" page under the "Data & Services" menu. If there are no data sources defined, this finding is not applicable. For each Data Source, view the "Login Timeout (sec)" setting within the Advanced Settings for the data source by editing the data source and then pressing the "Show Advanced Settings" button. If there are any data sources with a "Login Timeout (sec)" set higher than 5, this is a finding.
Fix: F-68421r1_fix
Navigate to the "Data Sources" page under the "Data & Services" menu. Edit each data source and set the "Login Timeout (sec)" to 5 or less within the advanced settings for the data source.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000192
- Vuln IDs
-
- V-62503
- Rule IDs
-
- SV-76993r1_rule
Checks: C-63307r1_chk
Within the Administrator Console, navigate to the "Request Tuning" page under the "Server Settings" menu. If "Timeout requests waiting in queue after" setting is set higher than 5, this is a finding.
Fix: F-68423r1_fix
Navigate to the "Request Tuning" page under the "Server Settings" menu. Set "Timeout requests waiting in queue after" to 5 or less and select the "Submit Changes" button.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- CF11-05-000193
- Vuln IDs
-
- V-62505
- Rule IDs
-
- SV-76995r1_rule
Checks: C-63309r1_chk
Within the Administrator Console, navigate to the "Request Tuning" page under the "Server Settings" menu. Validate that the "Request Queue Timeout Page" setting is set to a valid and custom page. If "Request Queue Timeout Page" is blank or is set to /CFIDE/administrator/templates/request_timeout_error.cfm, this is a finding. If a page is specified, validate that the file exist. The path and file given are relevant to the web servers' document root directory and not the OS root directory. For example, if the web servers' document root is /opt/webserver/wwwroot and the "Request Queue Timeout Page" is set to /CFIDE/administrator/templates/timeout_error.cfm, the full path to the template file is /opt/webserver/wwwroot/CFIDE/administrator/templates/timeout_error.cfm If the "Request Queue Timeout Page" setting is not set to a valid page, this is a finding.
Fix: F-68425r1_fix
Navigate to the "Request Tuning" page under the "Server Settings" menu. Set "Request Queue Timeout Page" to a custom and valid error page and select the "Submit Changes" button.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CF11-05-000194
- Vuln IDs
-
- V-62507
- Rule IDs
-
- SV-76997r1_rule
Checks: C-63311r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If "Maximum number of POST request parameters" is set greater than 50, this is a finding.
Fix: F-68427r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Set "Maximum number of POST request parameters" to 50 or less and select the "Submit Changes" button.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- CF11-05-000195
- Vuln IDs
-
- V-62509
- Rule IDs
-
- SV-76999r1_rule
Checks: C-63313r1_chk
Review the setting "JVM arguments" within the Administrator Console. These arguments can be found in the "Java and JVM" page accessed through the "Server Settings" menu option. The parameter -Dhttps.protocols is used to set the TLS versions that the JVM can use. Valid values for this setting must be TLS versions 1.0 or higher. An example settings to use TLS versions 1.2, 1.1 and 1.0 is -Dhttps.protocols=TLSv1.2,TLSv1.1,TLSv1 and an example to only use TLS version 1.2 is -Dhttps.protocols=TLSv1.2 If the "JVM arguments" setting does not contain the parameter -Dhttps.protocols or if the parameter -Dhttps.protocols contains any SSL versions, this is a finding.
Fix: F-68429r1_fix
Navigate to the "JVM arguments" setting within the Administrator Console. These arguments can be found in the "Java and JVM" page accessed through the "Server Settings" menu option. Add the parameter -Dhttps.protocols and set the parameter to the TLS versions to be used. A sample setting to use TLSv1.2, TLSv1.1 and TLSv1 is -Dhttps.protocols=TLSv1.2,TLSv1.1,TLSv1. SSL versions must not be added to this parameter. Once the parameter is added to the JVM arguments, select the "Submit Changes" button to save the changes and restart the ColdFusion application server to have the changes take effect.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- CF11-05-000196
- Vuln IDs
-
- V-62511
- Rule IDs
-
- SV-77001r1_rule
Checks: C-63315r1_chk
Within the Administrator Console, navigate to the "Memory Variables" page under the "Server Settings" menu. If "Secure Cookie" is not checked, this is a finding.
Fix: F-68431r1_fix
Navigate to the "Memory Variables" page under the "Server Settings" menu. Check "Secure Cookie" and select the "Submit Changes" button.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002421
- Version
- CF11-05-000197
- Vuln IDs
-
- V-62513
- Rule IDs
-
- SV-77003r1_rule
Checks: C-63317r1_chk
Within the Administrator Console, navigate to the "Java and JVM" page under the "Server Settings" menu. If the JVM argument-Dcoldfusion.enablefipscrypto=true cannot be found or -Dcoldfusion.enablefipscrypto is set to false, this is a finding.
Fix: F-68433r1_fix
Navigate to the "Java and JVM" page under the "Server Settings" menu. Locate the JVM argument coldfusion.enablefipscrypto. If the argument cannot be found, add the argument as -Dcoldfusion.enablefipscrypto=true. If the parameter is defined but set to false, change the setting to true.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002421
- Version
- CF11-05-000198
- Vuln IDs
-
- V-62515
- Rule IDs
-
- SV-77005r1_rule
Checks: C-63319r1_chk
If the Administrator Console is used to perform patch retrieval, navigate to the "Updates" page under the "Server Update" menu within the console and review the setting "Site URL" within the "Settings" tab. If the URL is not prefixed by https://, this is a finding. If a manual process is used to retrieve patches, verify that a documented process is in place that includes using an encrypted method to download the patches, e.g., VPN tunneling, Secure Copy (SCP), etc. If there is not a documented process or the process does not include an encrypted method to download patches, this is a finding.
Fix: F-68435r1_fix
If the Administrator Console is used for patch retrieval, navigate to the "Updates" page under the "Server Update" menu within the console. Locate the "Site URL" setting on the "Settings" tab. Update the URL used for updates to be prefixed with https:// so that the communication is encrypted and select the "Submit Changes" button. If a manual process is used to retrieve patches, document the process to retrieve the patches that uses an encrypted method to download the patches, e.g., VPN tunneling, Secure Copy (SCP), etc.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- CF11-05-000199
- Vuln IDs
-
- V-62517
- Rule IDs
-
- SV-77007r1_rule
Checks: C-63321r1_chk
Within the Administrator Console, navigate to the "Memory Variables" page under the "Server Settings" menu. If "HTTPOnly" is unchecked, this is a finding.
Fix: F-68437r1_fix
Navigate to the "Memory Variables" page under the "Server Settings" menu. Check "HTTPOnly" and select the "Submit Changes" button.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002420
- Version
- CF11-05-000200
- Vuln IDs
-
- V-62519
- Rule IDs
-
- SV-77009r1_rule
Checks: C-63323r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If the "Prefix serialized JSON with" is unchecked, this is a finding.
Fix: F-68439r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Check "Prefix serialized JSON with" and select the "Submit Changes" button.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- CF11-05-000203
- Vuln IDs
-
- V-62521
- Rule IDs
-
- SV-77011r1_rule
Checks: C-63325r1_chk
Interview the administrator to determine if ColdFusion is using certificates for PKI. If ColdFusion is not performing any PKI functions, this finding is not applicable. The CA certs are usually stored in a file called cacerts located in the directory $JAVA_HOME/jre/lib/security. If the file is not in this location, use a search command to locate the file or ask the administrator where the certificate store is located. Open a dos shell or terminal window and change to the location of the certificate store. To view the certificates within the certificate store, run the command (In this example, the keystore file is cacerts.): keytool -list -v -keystore cacerts Locate the "OU" field for each certificate within the keystore. The field should contain either DoD or CNSS as the Organizational Unit (OU). If the OU does not show that the certificates are DoD or CNSS supplied, this is a finding.
Fix: F-68441r1_fix
Request a CNSS or DoD Class 3 or Class 4 certificate and add it to the keystore to be used for PKI communication.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- CF11-06-000216
- Vuln IDs
-
- V-62523
- Rule IDs
-
- SV-77013r1_rule
Checks: C-63327r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. Validate that the "Missing Template Handler" setting is not blank and that the template specified is a valid. If the "Missing Template Handler" parameter is blank, this is a finding. If a template is specified, validate that the template exist. The path and file given are relevant to the web servers' document root directory and not the OS root directory. For example, if the web servers' document root is /opt/webserver/wwwroot and the "Missing Template Handler" is set to /CFIDE/administrator/templates/missing_template_error.cfm, the full path to the template file is /opt/webserver/wwwroot/CFIDE/administrator/templates/missing_template_error.cfm If the "Missing Template Handler" setting is not a valid file, this is a finding.
Fix: F-68443r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Specify a valid handler for missing templates and select the "Submit Changes" button.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- CF11-06-000217
- Vuln IDs
-
- V-62525
- Rule IDs
-
- SV-77015r1_rule
Checks: C-63329r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. Validate that the "Site-wide Error Handler" setting is not blank and that the template specified is valid. If the "Site-wide Error Handler" parameter is blank, this is a finding. If a template is specified, validate that the template exist. The path and file given are relevant to the web servers' document root directory and not the OS root directory. For example, if the web server's document root is /opt/webserver/wwwroot and the "Site-wide Error Handler" is set to /CFIDE/administrator/templates/secure_profile_error.cfm, the full path to the template file is /opt/webserver/wwwroot/CFIDE/administrator/templates/secure_profile_error.cfm If the "Site-wide Error Handler" setting is not a valid file, this is a finding.
Fix: F-68445r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Specify a custom and valid site-wide error handler and select the "Submit Changes" button.
- RMF Control
- SI-11
- Severity
- H
- CCI
- CCI-001312
- Version
- CF11-06-000218
- Vuln IDs
-
- V-62527
- Rule IDs
-
- SV-77017r1_rule
Checks: C-63331r1_chk
Within the Administrator Console, navigate to the "Debug Output Settings" page under the "Debugging & Output Settings" menu. If "Enable Robust Exception Information" is checked, this is a finding.
Fix: F-68447r1_fix
Navigate to the "Debug Output Settings" page under the "Debugging & Output Settings" menu. Uncheck "Enable Robust Exception Information" and select the "Submit Changes" button.
- RMF Control
- SI-11
- Severity
- H
- CCI
- CCI-001312
- Version
- CF11-06-000219
- Vuln IDs
-
- V-62529
- Rule IDs
-
- SV-77019r1_rule
Checks: C-63333r1_chk
Within the Administrator Console, navigate to the "Debug Output Settings" page under the "Debugging & Output Settings" menu. If "Enable AJAX Debug Log Window" is checked, this is a finding.
Fix: F-68449r1_fix
Navigate to the "Debug Output Settings" page under the "Debugging & Output Settings" menu. Uncheck "Enable AJAX Debug Log Window" and select the "Submit Changes" button.
- RMF Control
- SI-11
- Severity
- H
- CCI
- CCI-001312
- Version
- CF11-06-000220
- Vuln IDs
-
- V-62531
- Rule IDs
-
- SV-77021r1_rule
Checks: C-63335r1_chk
Within the Administrator Console, navigate to the "Debug Output Settings" page under the "Debugging & Output Settings" menu. If "Enable Request Debugging Output" is checked, this is a finding.
Fix: F-68451r1_fix
Navigate to the "Debug Output Settings" page under the "Debugging & Output Settings" menu. Uncheck "Enable Request Debugging Output" and select the "Submit Changes" button.
- RMF Control
- SI-11
- Severity
- H
- CCI
- CCI-001312
- Version
- CF11-06-000221
- Vuln IDs
-
- V-62533
- Rule IDs
-
- SV-77023r1_rule
Checks: C-63337r1_chk
Within the Administrator Console, navigate to the "Debugger Settings" page under the "Debugging & Output Settings" menu. If "Allow Line Debugging" is checked, this is a finding.
Fix: F-68453r1_fix
Navigate to the "Debugger Settings" page under the "Debugging & Output Settings" menu. Uncheck "Allow Line Debugging" and select the "Submit Changes" button.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- CF11-06-000222
- Vuln IDs
-
- V-62535
- Rule IDs
-
- SV-77025r1_rule
Checks: C-63339r1_chk
Within the Administrator Console, navigate to the "User Manager" page under the "Security" menu. Review each defined user and ask the SA if the user should have access to read error messages. For each user that should not be able to read error messages, review the roles assigned to the user account. If any user has the Debugging and Logging>Logging role that should not be able to read error messages, this is a finding.
Fix: F-68455r1_fix
Navigate to the "User Manager" page under the "Security" menu. Remove the "Debugging and Logging>Logging" role from each user that should not have access to read error messages.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- CF11-06-000223
- Vuln IDs
-
- V-62537
- Rule IDs
-
- SV-77027r1_rule
Checks: C-63341r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If the "Disable CFC Type check" is checked, this is a finding.
Fix: F-68457r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Uncheck "Disable CFC Type check" and select the "Submit Changes" button.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- CF11-06-000224
- Vuln IDs
-
- V-62539
- Rule IDs
-
- SV-77029r1_rule
Checks: C-63343r1_chk
Within the Administrator Console, navigate to the "Settings" page under the "Server Settings" menu. If the "Enable Global Script Protection" is unchecked, this is a finding.
Fix: F-68459r1_fix
Navigate to the "Settings" page under the "Server Settings" menu. Check "Enable Global Script Protection" and select the "Submit Changes" button.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- CF11-06-000225
- Vuln IDs
-
- V-62541
- Rule IDs
-
- SV-77031r1_rule
Checks: C-63345r1_chk
Within the Administrator Console, navigate to the "Updates" page under the "Server Update" menu. Within the "Installed Updates" tab, locate the backup directory location for each update that is installed. On the server running the ColdFusion server, verify that the backup directories do not exist for any of the updates. If all updates have been tested/verified and any of the backup directories exist, this is a finding. Note: Do not remove the backup directory for an update until the update has been tested and verified that the ColdFusion server is operating correctly.
Fix: F-68461r1_fix
Navigate to the "Updates" page under the "Server Update" menu within the Administrator Console. Within the "Installed Updates" tab, locate the backup directory location for any updates installed. On the server running the ColdFusion server, remove all backup directories for any updates installed. Note: Do not remove the backup directory for an update until the update has been tested and verified that the ColdFusion server is operating correctly.
- RMF Control
- SI-2
- Severity
- L
- CCI
- CCI-002605
- Version
- CF11-06-000226
- Vuln IDs
-
- V-62543
- Rule IDs
-
- SV-77033r1_rule
Checks: C-63347r1_chk
Determine if the ColdFusion server has access to either the Adobe patch repository or an internally maintained patch repository. This may be determined by interviewing the administrator or by reviewing ColdFusion baseline documentation. If the ColdFusion server has access to a patch repository, the server must check for updates. To verify that the server is checking for updates, within the Administrator Console, navigate to the "Updates" page under the "Server Updates" menu. Select the "Settings" tab and verify that the "Automatically Check for Updates" is checked. If the ColdFusion server has access to either the Adobe patch repository or an internally maintained patch repository and "Automatically Check for Updates" is not checked, this is a finding. If the ColdFusion server does not have access to Adobe or an internally maintained patch repository, then a manual process must be documented to check for updates. The documented process must include the location and how often to check for updates. If the process is not documented or the documented process does not include location and frequency, this is a finding.
Fix: F-68463r1_fix
If the ColdFusion server has access to a patch repository, navigate to the "Updates" page under the "Server Updates" menu. Select the "Settings" tab and check the "Automatically Check for Updates" setting and select the "Submit Changes" button. If the ColdFusion server does not have access to a patch repository, document the process to check for updates. The documented process must include location and how often.
- RMF Control
- SI-2
- Severity
- L
- CCI
- CCI-002605
- Version
- CF11-06-000227
- Vuln IDs
-
- V-62545
- Rule IDs
-
- SV-77035r1_rule
Checks: C-63349r1_chk
Determine if the ColdFusion server has access to either the Adobe patch repository or an internally maintained patch repository. This may be determined by interviewing the administrator or by reviewing ColdFusion baseline documentation. If the ColdFusion server has access to a patch repository, the server must notify administrators when updates are available. To verify that the server is notifying administrators, within the Administrator Console, navigate to the "Updates" page under the "Server Updates" menu. Select the "Settings" tab and verify that the "Check for updates every" is checked, that a positive value is entered for the "days" value and that at least one email address is entered for notification. If "Check for updates every" is not checked, the "days" value is empty or less than 1, or the "If updates are available, send email notification to" parameter is empty, this is a finding. If the ColdFusion server does not have access to a patch repository, then a documented notification process must be in place along with the administrator's enrollment in the Adobe automated patch notification service. To validate enrollment, a verification email or patch notification email can be used. If the administrators are not enrolled in the Adobe patch notification service or the process is not documented, this is a finding.
Fix: F-68465r1_fix
If the ColdFusion server has access to a patch repository, navigate to the "Updates" page under the "Server Updates" menu. Select the "Settings" tab and check the "Check for updates every" setting, enter a value greater than 0 for the "days" setting, and enter email addresses for notification. Select the "Submit Changes" button to save the new settings. If the ColdFusion server does not have access to a patch repository, document the process to enroll into the Adobe patch notification service and enroll all administrators in the notification service.