VMware vSphere 6.7 VAMI-lighttpd Security Technical Implementation Guide


This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]


Version / Release: V1R1

Published: 2021-04-15

Updated At: 2021-05-02 21:04:38




Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-239715r679255_rule VCLD-67-000001 CCI-000054 MEDIUM VAMI must limit the number of simultaneous requests. Denial of service (DOS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests. Mitigation against these threats is to take steps to lim
    SV-239716r679258_rule VCLD-67-000002 CCI-000068 HIGH VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections. Encryption of data in flight is an essential element of protecting information confidentiality. If a web server uses weak or outdated encryption algorithms, the server's communications can potentially be compromised. The US Federal Information Processing
    SV-239717r679261_rule VCLD-67-000003 CCI-000197 MEDIUM VAMI must use cryptography to protect the integrity of remote sessions. Data exchanged between the user and the web server can range from static display data to credentials used to log in to the hosted application. Even when data appears to be static, the non-displayed logic in a web page may expose business logic or trusted
    SV-239718r679338_rule VCLD-67-000004 CCI-000067 MEDIUM VAMI must be configured to monitor remote access. Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of success. VAMI uses the "mod_accesslog" module to log inform
    SV-239719r679267_rule VCLD-67-000005 CCI-000169 MEDIUM VAMI must generate log records for system startup and shutdown. Logging must be started as soon as possible when a service starts and when a service is stopped. Many forms of suspicious actions can be detected by analyzing logs for unexpected service starts and stops. Also, by starting to log immediately after a servi
    SV-239720r679270_rule VCLD-67-000006 CCI-000130 MEDIUM VAMI must produce log records containing sufficient information to establish what type of events occurred. After a security incident has occurred, investigators will often review log files to determine what happened. Understanding what type of event occurred is critical for investigation of a suspicious event. Satisfies: SRG-APP-000095-WSR-000056, SRG-APP-000
    SV-239721r679273_rule VCLD-67-000011 CCI-000162 MEDIUM VAMI log files must only be accessible by privileged users. Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and discovery of the true source of potentially malicious system activity would be difficult, if not impossible, to achieve. In add
    SV-239722r679276_rule VCLD-67-000014 CCI-001348 MEDIUM Rsyslog must be configured to monitor VAMI logs. For performance reasons, rsyslog file monitoring is preferred over configuring VAMI to send events to a syslog facility. Without ensuring that logs are created, that rsyslog configs are created, and that those configs are loaded, the log file monitoring a
    SV-239723r679279_rule VCLD-67-000015 CCI-001749 MEDIUM VAMI server binaries and libraries must be verified for their integrity. Being able to verify that a patch, upgrade, certificate, etc., being added to the web server is unchanged from the producer of the file is essential for file validation and non-repudiation of the information. VMware delivers product updates and patches
    SV-239724r679282_rule VCLD-67-000016 CCI-000381 MEDIUM VAMI must only load allowed server modules. A web server can provide many features, services, and processes. Some of these may be deemed unnecessary or too unsecure to run on a production DoD system. VAMI can be configured to load any number of external modules, but only a specific few are provid
    SV-239725r679285_rule VCLD-67-000017 CCI-000381 MEDIUM VAMI must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled. Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user can access more functionality than is needed for the operation of the hosted application poses a security issue. A user with too
    SV-239726r679288_rule VCLD-67-000018 CCI-000381 MEDIUM VAMI must explicitly disable Multipurpose Internet Mail Extensions (MIME) mime mappings based on "Content-Type". Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user can access more functionality than is needed for the operation of the hosted application poses a security issue. A user with too
    SV-239727r679291_rule VCLD-67-000019 CCI-000381 MEDIUM VAMI must remove all mappings to unused scripts. Scripts allow server-side processing on behalf of the hosted application user or as processes needed in the implementation of hosted applications. Removing scripts not needed for application operation or deemed vulnerable helps to secure the web server. T
    SV-239728r679294_rule VCLD-67-000020 CCI-000381 MEDIUM VAMI must have resource mappings set to disable the serving of certain file types. Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of file to a requesting client and identify which file types are not to be delivered to a client. By not specifying which files can an
    SV-239729r679297_rule VCLD-67-000021 CCI-000381 MEDIUM VAMI must not have the Web Distributed Authoring (WebDAV) servlet installed. A web server can be installed with functionality that, by its nature, is not secure. WebDAV is an extension to the HTTP protocol that, when developed, was meant to allow users to create, change, and move documents on a server, typically a web server or we
    SV-239730r679300_rule VCLD-67-000022 CCI-000381 MEDIUM VAMI must prevent hosted applications from exhausting system resources. Most of the attention to denial-of-service (DoS) attacks focuses on ensuring that systems and applications are not victims of these attacks. However, these systems and applications must also be secured against use to launch such an attack against others.
    SV-239731r679303_rule VCLD-67-000023 CCI-000381 MEDIUM VAMI must not have any symbolic links in the web content directory tree. A web server is designed to deliver content and execute scripts or applications on the request of a client or user. Containing user requests to files in the directory tree of the hosted web application and limiting the execution of scripts and application
    SV-239732r679306_rule VCLD-67-000025 CCI-000186 MEDIUM VAMI must protect the keystore from unauthorized access. The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the web server and clients. By gaining access to the private key, an attacker can preten
    SV-239733r679309_rule VCLD-67-000026 CCI-001082 MEDIUM VAMI must restrict access to the web root. As a rule, accounts on a web server are to be kept to a minimum, and those accounts are then restricted as to what they are allowed to access. The web root of the VAMI Lighttpd installation contains the content that is served up to the end user. This cont
    SV-239734r679312_rule VCLD-67-000027 CCI-001094 MEDIUM VAMI must protect against or limit the effects of HTTP types of denial-of-service (DoS) attacks. In UNIX and related computer operating systems, a file descriptor is an indicator used to access a file or other input/output resource, such as a pipe or network connection. File descriptors index into a per-process file descriptor table maintained by the
    SV-239735r679315_rule VCLD-67-000028 CCI-001310 MEDIUM VAMI must set the encoding for all text mime types to UTF-8. Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an appl
    SV-239736r679318_rule VCLD-67-000029 CCI-001312 MEDIUM VAMI must disable directory browsing. The goal is to completely control the web user's experience in navigating any portion of the web document root directories. Ensuring all web content directories have at least the equivalent of an "index.html" file is a significant factor to accomplish thi
    SV-239737r679321_rule VCLD-67-000030 CCI-001312 MEDIUM VAMI must not be configured to use "mod_status". Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data and security of the application and system. VAMI must only generate error messages that provide information necessary fo
    SV-239738r679324_rule VCLD-67-000031 CCI-001312 MEDIUM VAMI must have debug logging disabled. Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or trace information is enabled in a production web server, in
    SV-239739r679327_rule VCLD-67-000032 CCI-001813 MEDIUM VAMI configuration files must be protected from unauthorized access. Accounts on the VAMI server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the Lighttpd server. The resources to which these accounts have access must also be c
    SV-239740r679330_rule VCLD-67-000033 CCI-002385 MEDIUM VAMI must be protected from being stopped by a non-privileged user. An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to put in place changes the attacker made to the web server configuration. Therefore, only administrators should ever be able to stop V
    SV-239741r679333_rule VCLD-67-000034 CCI-002418 HIGH VAMI must implement TLS1.2 exclusively. Transport Layer Security (TLS) is a required transmission protocol for a web server hosting controlled information. The use of TLS provides confidentiality of data in transit between the web server and client. FIPS 140-2 approved TLS versions must be enab