VMware vSphere 6.7 UI Tomcat Security Technical Implementation Guide

Description

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]

Details

Version / Release: V1R1

Published: 2021-04-15

Updated At: 2021-05-02 21:04:37

Actions

Download

Filter

Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-239682r679152_rule VCUI-67-000001 CCI-000054 MEDIUM vSphere UI must limit the amount of time that each TCP connection is kept alive. Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests. In Tomcat, the "connectionTimeout" attribute sets the
    SV-239683r679155_rule VCUI-67-000002 CCI-000054 MEDIUM vSphere UI must limit the number of concurrent connections permitted. Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a website, facilitating a denial-of-service attack. Unless the number of requests is controlled, the web server can consume enough system resources to cause a sys
    SV-239684r679158_rule VCUI-67-000003 CCI-000054 MEDIUM vSphere UI must limit the maximum size of a POST request. The "maxPostSize" value is the maximum size in bytes of the POST that will be handled by the container FORM URL parameter parsing. Limit its size to reduce exposure to a denial-of-service attack. If "maxPostSize" is not set, the default value of 2097152
    SV-239685r679161_rule VCUI-67-000004 CCI-000054 MEDIUM vSphere UI must protect cookies from XSS. Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server and its applications. When a cookie is tagged with the "Ht
    SV-239686r679252_rule VCUI-67-000005 CCI-000067 MEDIUM vSphere UI must record user access in a format that enables monitoring of remote access. Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of success. Tomcat can be configured with an "AccessLogValve",
    SV-239687r679167_rule VCUI-67-000006 CCI-000169 MEDIUM vSphere UI must generate log records for system startup and shutdown. Logging must be started as soon as possible when a service starts and when a service is stopped. Many forms of suspicious actions can be detected by analyzing logs for unexpected service starts and stops. Also, by starting to log immediately after a servi
    SV-239688r679170_rule VCUI-67-000007 CCI-000162 MEDIUM vSphere UI log files must only be accessible by privileged users. Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and discovery of the true source of potentially malicious system activity would be difficult, if not impossible, to achieve. In addi
    SV-239689r679173_rule VCUI-67-000008 CCI-001749 MEDIUM vSphere UI application files must be verified for their integrity. Verifying that the vSphere UI application code is unchanged from its shipping state is essential for file validation and non-repudiation of the vSphere UI. There is no reason that the MD5 hash of the rpm original files should be changed after installation
    SV-239690r679176_rule VCUI-67-000009 CCI-001749 MEDIUM vSphere UI plugins must be authorized before use. The vSphere UI ships with a number of plugins out of the box. Any additional plugins may affect the availability and integrity of the system and must be approved and documented by the ISSO before deployment.
    SV-239691r679179_rule VCUI-67-000010 CCI-000381 MEDIUM vSphere UI must be configured to limit access to internal packages. The "package.access" entry in the "catalina.properties" file implements access control at the package level. When properly configured, a Security Exception will be reported if an errant or malicious web app attempts to access the listed internal classes d
    SV-239692r679182_rule VCUI-67-000011 CCI-000381 MEDIUM vSphere UI must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled. MIME mappings tell the vSphere UI what type of program various file types and extensions are and what external utilities or programs are needed to execute the file type. By ensuring that various shell script MIME types are not included in web.xml, the se
    SV-239693r679185_rule VCUI-67-000012 CCI-000381 MEDIUM vSphere UI must have mappings set for Java servlet pages. Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of file to a requesting client and identify which file types are not to be delivered to a client. By not specifying which files can an
    SV-239694r679188_rule VCUI-67-000013 CCI-000381 MEDIUM vSphere UI must not have the Web Distributed Authoring (WebDAV) servlet installed. WebDAV is an extension to the HTTP protocol that, when developed, was meant to allow users to create, change, and move documents on a server, typically a web server or web share. WebDAV is not widely used and has serious security concerns because it may a
    SV-239695r679191_rule VCUI-67-000014 CCI-000381 MEDIUM vSphere UI must be configured with memory leak protection. The Java Runtime environment can cause a memory leak or lock files under certain conditions. Without memory leak protection, vSphere UI can continue to consume system resources, which will lead to "OutOfMemoryErrors" when reloading web applications. Memo
    SV-239696r679194_rule VCUI-67-000015 CCI-000381 MEDIUM vSphere UI must not have any symbolic links in the web content directory tree. A web server is designed to deliver content and execute scripts or applications on the request of a client or user. Containing user requests to files in the directory tree of the hosted web application and limiting the execution of scripts and application
    SV-239697r679197_rule VCUI-67-000016 CCI-001082 MEDIUM vSphere UI directory tree must have permissions in an "out-of-the-box" state. As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. The resources to which these accounts have access must also b
    SV-239698r679200_rule VCUI-67-000017 CCI-001190 MEDIUM vSphere UI must fail to a known safe state if system initialization fails, shutdown fails, or aborts fail. Determining a safe state for failure and weighing that against a potential denial of service for users depends on what type of application the web server is hosting. For the Security Token Service, it is preferable that the service abort startup on any in
    SV-239699r679203_rule VCUI-67-000018 CCI-001094 MEDIUM vSphere UI must limit the number of allowed connections. Limiting the number of established connections is a basic denial-of-service protection and a best practice. Servers where the limit is too high or unlimited can potentially run out of system resources and negatively affect system availability.
    SV-239700r679206_rule VCUI-67-000019 CCI-001310 MEDIUM vSphere UI must set URIEncoding to UTF-8. Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an appl
    SV-239701r679209_rule VCUI-67-000020 CCI-001312 MEDIUM vSphere UI must set the welcome-file node to a default web page. Enumeration techniques, such as URL parameter manipulation, rely on being able to obtain information about the web server's directory structure by locating directories without default pages. In this scenario, the web server will display to the user a list
    SV-239702r679212_rule VCUI-67-000021 CCI-001312 MEDIUM The vSphere UI must not show directory listings. Enumeration techniques, such as URL parameter manipulation, rely on being able to obtain information about the web server's directory structure by locating directories without default pages. In this scenario, the web server will display to the user a list
    SV-239703r679215_rule VCUI-67-000022 CCI-001312 MEDIUM vSphere UI must be configured to hide the server version. Web servers will often display error messages to client users with enough information to aid in the debugging of the error. The information given back in error messages may display the web server type, version, patches installed, plug-ins and modules inst
    SV-239704r679218_rule VCUI-67-000023 CCI-001312 MEDIUM vSphere UI must be configured to show error pages with minimal information. Web servers will often display error messages to client users with enough information to aid in the debugging of the error. The information given back in error messages may display the web server type, version, patches installed, plug-ins and modules inst
    SV-239705r679221_rule VCUI-67-000024 CCI-001312 MEDIUM vSphere UI must not enable support for TRACE requests. "Trace" is a technique for a user to request internal information about Tomcat. This is useful during product development but should not be enabled in production. Allowing an attacker to conduct a Trace operation against the Security Token Service will ex
    SV-239706r679224_rule VCUI-67-000025 CCI-001312 MEDIUM vSphere UI must have the debug option turned off. Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or trace information is enabled in a production web server, in
    SV-239707r679227_rule VCUI-67-000026 CCI-001849 MEDIUM vSphere UI must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the web server. To ensure that the logging mechanism used by the web server has sufficient storage capacity in which to write the logs, the logging mechanism needs to be able to allocate log record storage capacity. vSphere UI configures log sizes and rotation appropriat
    SV-239708r679230_rule VCUI-67-000027 CCI-000139 MEDIUM vSphere UI log files must be moved to a permanent repository in accordance with site policy. vSphere UI produces a handful of logs that must be offloaded from the originating system. This information can then be used for diagnostic, forensic, or other purposes relevant to ensuring the availability and integrity of the hosted application. Satisfi
    SV-239709r679233_rule VCUI-67-000028 CCI-001762 MEDIUM vSphere UI must be configured with the appropriate ports. Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The ports that vSphere UI listens on are configured in the "catal
    SV-239710r679236_rule VCUI-67-000029 CCI-002385 MEDIUM vSphere UI must disable the shutdown port. An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to put in place changes the attacker made to the web server configuration. If the Tomcat shutdown port feature is enabled, a shutdown s
    SV-239711r679239_rule VCUI-67-000030 CCI-002418 MEDIUM vSphere UI must set the secure flag for cookies. The secure flag is an option that can be set by the application server when sending a new cookie to the user within an HTTP Response. The purpose of the secure flag is to prevent cookies from being observed by unauthorized parties due to the transmission
    SV-239712r679242_rule VCUI-67-000031 CCI-000381 MEDIUM vSphere UI must not be configured with the "UserDatabaseRealm" enabled. The vSphere UI performs user authentication at the application level and not through Tomcat. By default, there is no configuration for the "UserDatabaseRealm" Tomcat authentication mechanism. To eliminate unnecessary features and ensure that the vSphere
    SV-239713r679245_rule VCUI-67-000032 CCI-001664 MEDIUM vSphere UI must restrict its cookie path. When the cookie parameters are not set properly (i.e., domain and path parameters), cookies can be shared within hosted applications residing on the same web server or to applications hosted on different web servers residing on the same domain. vSphere U