Apache Tomcat Application Sever 9 Security Technical Implementation Guide

Description

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]

Details

Version / Release: V2R3

Published: 2021-06-15

Updated At: 2021-08-02 18:00:59

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter

Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-222926r615938_rule TCAT-AS-000010 CCI-000054 LOW The number of allowed simultaneous sessions to the manager application must be limited. The manager application provides configuration access to the Tomcat server. Access to the manager application must be limited and that includes the number of sessions allowed to access the management application. A balance must be struck between the numbe
    SV-222927r615938_rule TCAT-AS-000020 CCI-000068 MEDIUM Secured connectors must be configured to use strong encryption ciphers. The Tomcat element controls the TLS protocol and the associated ciphers used. If a strong cipher is not selected, an attacker may be able to circumvent encryption protections that are configured for the connector. Strong ciphers must be employed when con
    SV-222928r754865_rule TCAT-AS-000030 CCI-001453 LOW HTTP Strict Transport Security (HSTS) must be enabled. HTTP Strict Transport Security (HSTS) instructs web browsers to only use secure connections for all future requests when communicating with a website. Doing so helps prevent SSL protocol attacks, SSL stripping, cookie hijacking, and other attempts to circ
    SV-222929r615938_rule TCAT-AS-000040 CCI-000197 MEDIUM TLS 1.2 must be used on secured HTTP connectors. Using older versions of TLS introduces security vulnerabilities that exist in the older versions of the protocol. Tomcat by default will use all available versions of the SSL/TLS protocols unless the version is explicitly defined in the SSL configuration
    SV-222930r615938_rule TCAT-AS-000050 CCI-000067 MEDIUM AccessLogValve must be configured for each application context. Tomcat has the ability to host multiple contexts (applications) on one physical server by using the attribute. This allows the admin to specify audit log settings on a per application basis. Satisfies: SRG-APP-000016-AS-000013, SRG-APP-000080-AS-000045,
    SV-222931r615938_rule TCAT-AS-000060 CCI-000186 HIGH Default password for keystore must be changed. Tomcat currently operates only on JKS, PKCS11, or PKCS12 format keystores. The JKS format is Java's standard "Java KeyStore" format, and is the format created by the keytool command-line utility which is included in the JDK. The PKCS12 format is an intern
    SV-222932r615938_rule TCAT-AS-000070 CCI-000213 MEDIUM Cookies must have secure flag set. It is possible to steal or manipulate web application session and cookies without having a secure cookie. Configuring the secure flag injects the setting into the response header. The $CATALINA_BASE/conf/web.xml file controls how all applications handle
    SV-222933r615938_rule TCAT-AS-000080 CCI-000213 MEDIUM Cookies must have http-only flag set. It is possible to steal or manipulate web application session and cookies without having a secure cookie. Configuring the secure flag injects the setting into the response header. The $CATALINA_BASE/conf/web.xml file controls how all applications handle
    SV-222934r615938_rule TCAT-AS-000090 CCI-000213 MEDIUM DefaultServlet must be set to readonly for PUT and DELETE. The DefaultServlet is a servlet provided with Tomcat. It is called when no other suitable page can be displayed to the client. The DefaultServlet serves static resources as well as directory listings and is declared globally in $CATALINA_BASE/conf/web.xml
    SV-222935r615938_rule TCAT-AS-000100 CCI-000213 MEDIUM Connectors must be secured. The unencrypted HTTP protocol does not protect data from interception or alteration which can subject users to eavesdropping, tracking, and the modification of received data. To secure an HTTP connector, both the secure and scheme flags must be set.
    SV-222936r615938_rule TCAT-AS-000110 CCI-000213 MEDIUM The Java Security Manager must be enabled. The Java Security Manager (JSM) is what protects the Tomcat server from trojan servlets, JSPs, JSP beans, tag libraries, or even from inadvertent mistakes. The JSM works the same way a client's web browser isolates a running web application via a sandbox,
    SV-222937r615938_rule TCAT-AS-000170 CCI-000169 MEDIUM Tomcat servers behind a proxy or load balancer must log client IP. When running Tomcat behind a load balancer or proxy, default behavior is for Tomcat to log the proxy or load balancer IP address as the client IP. Desired behavior is to log the actual client IP rather than the proxy IP address. The RemoteIpValve logging
    SV-222938r615938_rule TCAT-AS-000180 CCI-000130 MEDIUM AccessLogValve must be configured per each virtual host. Application servers utilize role-based access controls in order to specify the individuals who are allowed to configure application component loggable events. The application server must be configured to select which personnel are assigned the role of sel
    SV-222939r615938_rule TCAT-AS-000240 CCI-000131 MEDIUM Date and time of events must be logged. The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface within the /opt/tomcat/server.xml configuration file: The %t pattern code is included in the pattern element and logs the date and
    SV-222940r615938_rule TCAT-AS-000250 CCI-000132 MEDIUM Remote hostname must be logged. The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface within the /opt/tomcat/server.xml configuration file: The %h pattern code is included in the pattern element and logs the remote ho
    SV-222941r615938_rule TCAT-AS-000260 CCI-000132 LOW HTTP status code must be logged. The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface within the /opt/tomcat/server.xml configuration file: The %s pattern code is included in the pattern element and logs the server re
    SV-222942r615938_rule TCAT-AS-000270 CCI-000132 MEDIUM The first line of request must be logged. The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface within the /opt/tomcat/server.xml configuration file: The "%r" pattern code is included in the pattern element and logs t
    SV-222943r615938_rule TCAT-AS-000360 CCI-000162 MEDIUM $CATALINA_BASE/logs folder permissions must be set to 750. Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permissions, and world has no permissions. The exceptions are the
    SV-222944r615938_rule TCAT-AS-000361 CCI-000162 MEDIUM Files in the $CATALINA_BASE/logs/ folder must have their permissions set to 640. Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permissions, and world has no permissions. The exceptions are the
    SV-222945r615938_rule TCAT-AS-000370 CCI-000163 MEDIUM Files in the $CATALINA_BASE/conf/ folder must have their permissions set to 640. Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permissions, and world has no permissions. The exceptions are the
    SV-222946r754839_rule TCAT-AS-000371 CCI-000163 MEDIUM $CATALINA_BASE/conf folder permissions must be set to 750. Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permissions, and world has no permissions. The exceptions are the
    SV-222947r754840_rule TCAT-AS-000380 CCI-000164 MEDIUM Jar files in the $CATALINA_HOME/bin/ folder must have their permissions set to 640. Tomcat's file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with the group Tomcat. While root has read/write privileges, tomcat group only has read permissions, and world has no permissions. The excep
    SV-222948r754841_rule TCAT-AS-000390 CCI-001493 MEDIUM $CATALINA_HOME/bin folder permissions must be set to 750. Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permissions, and world has no permissions. The exceptions are the
    SV-222949r615938_rule TCAT-AS-000450 CCI-001499 MEDIUM Tomcat user UMASK must be set to 0027. For Unix-based systems, umask settings affect file creation permissions. If the permissions are too loose, newly created log files and applications could be accessible to unauthorized users via the file system. Ensure the Tomcat OS user account has the c
    SV-222950r615938_rule TCAT-AS-000470 CCI-000381 MEDIUM Stack tracing must be disabled. Stack tracing provides debugging information from the application call stacks when a runtime error is encountered. If stack tracing is left enabled, Tomcat will provide this call stack information to the requestor which could result in the loss of sensiti
    SV-222951r615938_rule TCAT-AS-000490 CCI-000381 MEDIUM The shutdown port must be disabled. Tomcat listens on TCP port 8005 to accept shutdown requests. By connecting to this port and sending the SHUTDOWN command, all applications within Tomcat are halted. The shutdown port is not exposed to the network as it is bound to the loopback interface.
    SV-222952r615938_rule TCAT-AS-000500 CCI-000381 MEDIUM Unapproved connectors must be disabled. Connectors are how Tomcat receives requests, passes them to hosted web applications, and then sends back the results to the requestor. Tomcat provides HTTP and Apache JServ Protocol (AJP) connectors and makes these protocols available via configured netwo
    SV-222953r615938_rule TCAT-AS-000510 CCI-000381 LOW DefaultServlet debug parameter must be disabled. The DefaultServlet serves static resources as well as serves the directory listings (if directory listings are enabled). It is declared globally in $CATALINA_BASE/conf/web.xml and by default is configured with the "debug" parameter set to 0, which is disa
    SV-222954r615938_rule TCAT-AS-000520 CCI-000381 LOW DefaultServlet directory listings parameter must be disabled. The DefaultServlet serves static resources as well as directory listings. It is declared globally in $CATALINA_BASE/conf/web.xml and by default is configured with the directory "listings" parameter set to disabled. If no welcome file is present and the "l
    SV-222955r615938_rule TCAT-AS-000530 CCI-000381 MEDIUM The deployXML attribute must be set to false in hosted environments. The Host element controls deployment. Automatic deployment allows for simpler management, but also makes it easier for an attacker to deploy a malicious application. Automatic deployment is controlled by the autoDeploy and deployOnStartup attributes. If b
    SV-222956r615938_rule TCAT-AS-000540 CCI-000381 MEDIUM Autodeploy must be disabled. Tomcat allows auto-deployment of applications while Tomcat is running. This can allow untested or malicious applications to be automatically loaded into production. Autodeploy must be disabled in production. This requirement is NA for test and developme
    SV-222957r615938_rule TCAT-AS-000550 CCI-000381 LOW xpoweredBy attribute must be disabled. Individual connectors can be configured to display the Tomcat server info to clients. This information can be used to identify Tomcat versions which can be useful to attackers for identifying vulnerable versions of Tomcat. Individual connectors must be ch
    SV-222958r615938_rule TCAT-AS-000560 CCI-000381 LOW Example applications must be removed. Tomcat provides example applications, documentation, and other directories in the default installation which do not serve a production use. These files must be deleted.
    SV-222959r615938_rule TCAT-AS-000570 CCI-000381 LOW Tomcat default ROOT web application must be removed. The default ROOT web application includes the version of Tomcat that is being used, links to Tomcat documentation, examples, FAQs, and mailing lists. The default ROOT web application must be removed from a publicly accessible Tomcat instance and a more ap
    SV-222960r615938_rule TCAT-AS-000580 CCI-000381 LOW Documentation must be removed. Tomcat provides documentation and other directories in the default installation which do not serve a production use. These files must be deleted.
    SV-222961r615938_rule TCAT-AS-000590 CCI-000382 MEDIUM Applications in privileged mode must be approved by the ISSO. The privileged attribute controls if a context (application) is allowed to use container provided servlets like the Manager servlet. It is false by default and should only be changed for trusted web applications. Set to true to allow the context (applica
    SV-222962r615938_rule TCAT-AS-000600 CCI-000764 MEDIUM Tomcat management applications must use LDAP realm authentication. Using the local user store on a Tomcat installation does not meet a multitude of security control requirements related to user account management. To address this risk, Tomcat must be configured to utilize an LDAP or Active Directory installation that pro
    SV-222963r615938_rule TCAT-AS-000610 CCI-000765 MEDIUM JMX authentication must be secured. Java Management Extensions (JMX) provides the means to remotely manage the Java VM. When enabling the JMX agent for remote monitoring, the user must enable authentication.
    SV-222964r615938_rule TCAT-AS-000630 CCI-000770 HIGH TLS must be enabled on JMX. Java Management Extensions (JMX) provides the means for enterprises to remotely manage the Java VM and can be used in place of the local manager application that comes with Tomcat. JMX management is configured via the Tomcat CATALINA_OPTS setting mainta
    SV-222965r615938_rule TCAT-AS-000690 CCI-000197 HIGH LDAP authentication must be secured. JNDIRealm is an implementation of the Tomcat Realm interface. Tomcat uses the JNDIRealm to look up users in an LDAP directory server. The realm's connection to the directory is defined by the 'connectionURL' configuration attribute. This attribute is usu
    SV-222966r616155_rule TCAT-AS-000700 CCI-000185 MEDIUM DoD root CA certificates must be installed in Tomcat trust store. Tomcat truststores are used to validate client certificates. On the Ubuntu OS, by default Tomcat uses the "cacerts" file as the CA trust store. The file is located in the /etc/ssl/certs/java/ folder with a link to the file in $JAVA_HOME/lib/security/cace
    SV-222967r615938_rule TCAT-AS-000710 CCI-000186 MEDIUM Keystore file must be protected. Keystore file contains authentication information used to access application data and data resources. Access to the file must be protected. The default location is in the .keystore file stored in the home folder of the user account used to run Tomcat alt
    SV-222968r615938_rule TCAT-AS-000750 CCI-000803 HIGH Tomcat must use FIPS-validated ciphers on secured connectors. Connectors are how Tomcat receives requests over a network port, passes them to hosted web applications via HTTP or AJP, and then sends the results back to the requestor. Cryptographic ciphers are associated with the connector to create a secured connecto
    SV-222969r615938_rule TCAT-AS-000780 CCI-001082 MEDIUM Access to JMX management interface must be restricted. Java Management Extensions (JMX) is used to provide programmatic access to Tomcat for management purposes. This includes monitoring and control of java applications running on Tomcat. If network access to the JMX port is not restricted, attackers can gain
    SV-222970r615938_rule TCAT-AS-000790 CCI-001082 MEDIUM Access to Tomcat manager application must be restricted. The Tomcat manager application is used to manage the Tomcat server and the applications that run on Tomcat. By default, the manager application is only accessible via the localhost. Exposing the management application to any network interface that is avai
    SV-222971r615938_rule TCAT-AS-000800 CCI-001184 MEDIUM Tomcat servers must mutually authenticate proxy or load balancer connections. Tomcat servers are often placed behind a proxy when exposed to both trusted and untrusted networks. This is done for security and performance reasons. Tomcat does provide an HTTP server that can be configured to make hosted applications available to clie
    SV-222973r615938_rule TCAT-AS-000820 CCI-001664 LOW Tomcat must be configured to limit data exposure between applications. If RECYCLE_FACADES is true or if a security manager is in use, a new facade object will be created for each request. This reduces the chances that a bug in an application might expose data from one request to another. This setting is configured using envi
    SV-222974r615938_rule TCAT-AS-000860 CCI-001190 MEDIUM Clusters must operate on a trusted network. Operating a Tomcat cluster on an untrusted network creates potential for unauthorized persons to view or manipulate cluster session traffic. When operating a Tomcat cluster, care must be taken to isolate the cluster traffic from untrusted sources. Options
    SV-222975r615938_rule TCAT-AS-000920 CCI-001312 MEDIUM ErrorReportValve showServerInfo must be set to false. The Error Report Valve is a simple error handler for HTTP status codes that will generate and return HTML error pages. It can also be configured to return pre-defined static HTML pages for specific status codes and/or exception types. Disabling showServer
    SV-222976r615938_rule TCAT-AS-000930 CCI-001314 LOW Default error pages for manager application must be customized. Default error pages that accompany the manager application provide educational information on how to configure user accounts and groups for accessing the manager application. These error pages provide responses to 401 (Unauthorized), 403 (Forbidden), and
    SV-222977r615938_rule TCAT-AS-000940 CCI-001314 MEDIUM ErrorReportValve showReport must be set to false. The Error Report Valve is a simple error handler for HTTP status codes that will generate and return HTML error pages. It can also be configured to return pre-defined static HTML pages for specific status codes and/or exception types. Disabling showReport
    SV-222978r615938_rule TCAT-AS-000950 CCI-001314 LOW Tomcat server version must not be sent with warnings and errors. A first order of attack is to identify vulnerable servers and services. Removing version information that would otherwise be provided when a client requests version data or receives an error message can limit automated attack attempts. Remove or replace t
    SV-222979r615938_rule TCAT-AS-000970 CCI-002361 MEDIUM Idle timeout for management application must be set to 10 minutes. Tomcat can set idle session timeouts on a per application basis. The management application is provided with the Tomcat installation and is used to manage the applications that are installed on the Tomcat Server. Setting the idle timeout for the managemen
    SV-222980r615938_rule TCAT-AS-001020 CCI-002314 MEDIUM LockOutRealms must be used for management of Tomcat. A LockOutRealm adds the ability to lock a user out after multiple failed logins. LockOutRealm is an implementation of the Tomcat Realm interface that extends the CombinedRealm to provide user lock out functionality if there are too many failed authenticat
    SV-222981r615938_rule TCAT-AS-001030 CCI-002322 MEDIUM LockOutRealms failureCount attribute must be set to 5 failed logins for admin users. A LockOutRealm adds the ability to lock a user out after multiple failed logins. Setting the failureCount attribute to 5 will lock out a user account after 5 failed attempts. LockOutRealm is an implementation of the Tomcat Realm interface that extends t
    SV-222982r615938_rule TCAT-AS-001040 CCI-002322 LOW LockOutRealms lockOutTime attribute must be set to 600 seconds (10 minutes) for admin users. A LockOutRealm adds the ability to specify a lockout time that prevents further attempts after multiple failed logins. Setting the lockOutTime attribute to 600 will lock out a user account for 10 minutes. Further authentication failures during the lock ou
    SV-222983r615938_rule TCAT-AS-001050 CCI-002235 MEDIUM Tomcat user account must be set to nologin. When installing Tomcat, a user account is created on the OS. This account is used in order for Tomcat to be able to operate on the OS but does not require the ability to actually log in to the system. Therefore when the account is created, the account mus
    SV-222984r615938_rule TCAT-AS-001060 CCI-002235 MEDIUM Tomcat user account must be a non-privileged user. Use a distinct non-privileged user account for running Tomcat. If Tomcat processes are compromised and a privileged user account is used to operate the Tomcat server processes, the entire system becomes compromised. Sample passwd file: tomcat:x:1001:1001
    SV-222985r615938_rule TCAT-AS-001080 CCI-002234 LOW Application user name must be logged. The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface within the /opt/tomcat/server.xml configuration file: The %u pattern code is included in the pattern element and logs the username
    SV-222986r615938_rule TCAT-AS-001200 CCI-001813 MEDIUM $CATALINA_HOME folder must be owned by the root user, group tomcat. Tomcat file permissions must be restricted. The standard configuration is to have the folder where Tomcat is installed owned by the root user with the group set to tomcat. The $CATALINA_HOME environment variable should be set to the location of the root d
    SV-222987r754842_rule TCAT-AS-001220 CCI-001813 MEDIUM $CATALINA_BASE/conf/ folder must be owned by root, group tomcat. Tomcat file permissions must be restricted. The standard configuration is to have Tomcat files contained in the conf/ folder as members of the "tomcat" group. While root has read/write privileges, group only has read permissions, and world has no permissi
    SV-222988r754843_rule TCAT-AS-001250 CCI-001813 MEDIUM $CATALINA_BASE/logs/ folder must be owned by tomcat user, group tomcat. Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permissions, and world has no permissions. The exceptions are the
    SV-222989r754844_rule TCAT-AS-001260 CCI-001813 LOW $CATALINA_BASE/temp/ folder must be owned by tomcat user, group tomcat. Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permissions, and world has no permissions. The exceptions are the
    SV-222990r754845_rule TCAT-AS-001270 CCI-001813 LOW $CATALINA_BASE/temp folder permissions must be set to 750. Tomcat's file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with the group Tomcat. While root has read/write privileges, tomcat group only has read and world has no permissions. The exceptions are the
    SV-222991r754846_rule TCAT-AS-001280 CCI-001813 MEDIUM $CATALINA_BASE/work/ folder must be owned by tomcat user, group tomcat. Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permissions, and world has no permissions. The exceptions are the
    SV-222993r615938_rule TCAT-AS-001320 CCI-001953 MEDIUM Multifactor certificate-based tokens (CAC) must be used when accessing the management interface. Password authentication does not provide sufficient security control when accessing a management interface. DoD has specified that the CAC will be used when authenticating and passwords will only be used when CAC authentication is not a plausible solution
    SV-222994r615938_rule TCAT-AS-001430 CCI-002470 MEDIUM Certificates in the trust store must be issued/signed by an approved CA. Use of self-signed certificates creates a lack of integrity and invalidates the certificate based authentication trust model. Certificates used by production systems must be issued/signed by a trusted Root CA and cannot be self-signed. For systems that co
    SV-222995r615938_rule TCAT-AS-001460 CCI-002385 MEDIUM The application server, when categorized as a high availability system within RMF, must be in a high-availability (HA) cluster. A MAC I system is a system that handles data vital to the organization's operational readiness or effectiveness of deployed or contingency forces. A MAC I system must maintain the highest level of integrity and availability. By HA clustering the applicati
    SV-222996r615938_rule TCAT-AS-001470 CCI-002385 MEDIUM Tomcat server must be patched for security vulnerabilities. Tomcat is constantly being updated to address newly discovered vulnerabilities, some of which include denial-of-service attacks. To address this risk, the Tomcat administrator must ensure the system remains up to date on patches. Satisfies: SRG-APP-00043
    SV-222997r615938_rule TCAT-AS-001560 CCI-000172 MEDIUM AccessLogValve must be configured for Catalina engine. The container represents the entire request processing machinery associated with a particular Catalina Service. It receives and processes all requests from one or more Connectors, and returns the completed response to the Connector for transmission back
    SV-222998r615938_rule TCAT-AS-001590 CCI-000172 MEDIUM Changes to $CATALINA_HOME/bin/ folder must be logged. The $CATALINA_HOME/bin folder contains startup and control scripts for the Tomcat Catalina server. To provide forensic evidence in the event of file tampering, changes to content in this folder must be logged. For Linux OS flavors other than Ubuntu, use t
    SV-222999r615938_rule TCAT-AS-001591 CCI-000172 MEDIUM Changes to $CATALINA_BASE/conf/ folder must be logged. The $CATALINA_BASE/conf folder contains configuration files for the Tomcat Catalina server. To provide forensic evidence in the event of file tampering, changes to contents in this folder must be logged. For Linux OS flavors other than Ubuntu, use the rel
    SV-223000r615938_rule TCAT-AS-001592 CCI-000172 MEDIUM Changes to $CATALINA_HOME/lib/ folder must be logged. The $CATALINA_HOME/lib folder contains library files for the Tomcat Catalina server. These are in the form of java archive (jar) files. To provide forensic evidence in the event of file tampering, changes to contents in this folder must be logged. For Lin
    SV-223001r615938_rule TCAT-AS-001640 CCI-002450 LOW Application servers must use NIST-approved or NSA-approved key management technology and processes. Class 3 PKI certificates are used for servers and software signing rather than for identifying individuals. Class 4 certificates are used for business-to-business transactions. Utilizing unapproved certificates not issued or approved by DoD or CNS creates
    SV-223002r615938_rule TCAT-AS-001660 CCI-000366 LOW STRICT_SERVLET_COMPLIANCE must be set to true. Strict Servlet Compliance forces Tomcat to adhere to standards specifications including but not limited to RFC2109. RFC2109 sets the standard for HTTP session management. This setting affects several settings which primarily pertain to cookie headers, coo
    SV-223003r615938_rule TCAT-AS-001670 CCI-000366 LOW RECYCLE_FACADES must be set to true. If RECYCLE_FACADES is true or if a security manager is in use, a new facade object will be created for each request. This reduces the chances that a bug in an application might expose data from one request to another. This setting is configured using envi
    SV-223004r615938_rule TCAT-AS-001680 CCI-000366 MEDIUM ALLOW_BACKSLASH must be set to false. When Tomcat is installed behind a proxy configured to only allow access to certain Tomcat contexts (web applications), an HTTP request containing "/\../" may allow attackers to work around the proxy restrictions using directory traversal attack methods. I
    SV-223005r615938_rule TCAT-AS-001690 CCI-000366 MEDIUM ENFORCE_ENCODING_IN_GET_WRITER must be set to true. Some clients try to guess the character encoding of text media when the mandated default of ISO-8859-1 should be used. Some browsers will interpret as UTF-7 when the characters are safe for ISO-8859-1. This can create the potential for a XSS attack. To de
    SV-223006r615938_rule TCAT-AS-001700 CCI-000366 MEDIUM Tomcat users in a management role must be approved by the ISSO. Deploying applications to Tomcat requires a Tomcat user account that is in the "manager-script" role. Any user accounts in a Tomcat management role must be approved by the ISSO.
    SV-223007r615938_rule TCAT-AS-001710 CCI-000366 LOW Hosted applications must be documented in the system security plan. The ISSM/ISSO must be cognizant of all applications operating on the Tomcat server, and must address any security implications associated with the operation of the applications. If unknown/undocumented applications are operating on the Tomcat server, the
    SV-223008r615938_rule TCAT-AS-001720 CCI-000366 LOW Connectors must be approved by the ISSO. Connectors are how Tomcat receives requests over a network port, passes them to hosted web applications via HTTP or AJP and then sends back the results to the requestor. A port and a protocol are tied to each connector. Only connectors approved by the ISS
    SV-223009r615938_rule TCAT-AS-001730 CCI-000366 LOW Connector address attribute must be set. Connectors are how Tomcat receives requests over a network port, passes them to hosted web applications via HTTP or AJP, and then sends back the results to the requestor. The "address" attribute specifies which network interface the connector listens on.
    SV-223010r615938_rule TCAT-AS-001731 CCI-000139 MEDIUM The application server must alert the SA and ISSO, at a minimum, in the event of a log processing failure. Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the failure can be lost. To minimize the timeframe of the log failure