VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +62 −62
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 62
- V-240215 Medium Lighttpd must limit the number of simultaneous requests.
- V-240216 Medium Lighttpd must be configured with FIPS 140-2 compliant ciphers for https connections.
- V-240217 Medium Lighttpd must be configured to use the SSL engine.
- V-240218 Medium Lighttpd must be configured to use mod_accesslog.
- V-240219 Medium Lighttpd must generate log records for system startup and shutdown.
- V-240220 Medium Lighttpd must produce log records containing sufficient information to establish what type of events occurred.
- V-240221 Medium Lighttpd must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-240222 Medium Lighttpd must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-240223 Medium Lighttpd must produce log records containing sufficient information to establish the source of events.
- V-240224 Medium Lighttpd must produce log records containing sufficient information to establish the outcome (success or failure) of events.
- V-240225 Medium Lighttpd must have the correct ownership on the log files to ensure they are only be accessible by privileged users.
- V-240226 Medium Lighttpd must have the correct group-ownership on the log files to ensure they are only be accessible by privileged users.
- V-240227 Medium Lighttpd must have the correct permissions on the log files to ensure they are only be accessible by privileged users.
- V-240228 Medium Lighttpd must have the correct ownership on the log files to ensure they are protected from unauthorized modification.
- V-240229 Medium Lighttpd must have the correct group-ownership on the log files to ensure they are protected from unauthorized modification.
- V-240230 Medium Lighttpd must have the correct permissions on the log files to ensure they are protected from unauthorized modification.
- V-240231 Medium Lighttpd must have the correct ownership on the log files to ensure they are protected from unauthorized deletion.
- V-240232 Medium Lighttpd must have the correct group-ownership on the log files to ensure they are protected from unauthorized deletion.
- V-240233 Medium Lighttpd must have the correct permissions on the log files to ensure they are protected from unauthorized deletion.
- V-240234 Medium Lighttpd log data and records must be backed up onto a different system or media.
- V-240235 Medium Lighttpd files must be verified for their integrity before being added to a production web server.
- V-240236 Medium Lighttpd expansion modules must be verified for their integrity before being added to a production web server.
- V-240237 Medium Lighttpd must prohibit unnecessary services, functions or processes.
- V-240238 Medium Lighttpd proxy settings must be configured.
- V-240239 High Lighttpd must only contain components that are operationally necessary.
- V-240240 Medium Lighttpd must have MIME types for csh or sh shell programs disabled.
- V-240241 Medium Lighttpd must only enable mappings to necessary and approved scripts.
- V-240242 Medium Lighttpd must have resource mappings set to disable the serving of certain file types.
- V-240243 Medium Lighttpd must not have the Web Distributed Authoring (WebDAV) module installed.
- V-240244 Medium Lighttpd must not have the webdav configuration file included.
- V-240245 Medium Lighttpd must prevent hosted applications from exhausting system resources.
- V-240246 High Lighttpd must not use symbolic links in the Lighttpd web content directory tree.
- V-240247 Medium Lighttpd must be configured to use port 5480.
- V-240248 Medium Lighttpd must use SSL/TLS protocols in order to secure passwords during transmission from the client.
- V-240249 Medium Lighttpd must have private key access restricted.
- V-240250 Medium Lighttpd must be configured to use only FIPS 140-2 approved ciphers.
- V-240251 High Lighttpd must prohibit non-privileged accounts from accessing the directory tree, the shell, or other operating system functions and utilities.
- V-240252 High Lighttpd must have the latest version installed.
- V-240253 Medium The Lighttpd baseline must be maintained.
- V-240254 Medium Lighttpd must protect against or limit the effects of HTTP types of Denial of Service (DoS) attacks.
- V-240255 Medium Lighttpd must disable directory browsing.
- V-240256 Medium Lighttpd must not be configured to use mod_status.
- V-240257 Medium Lighttpd must have debug logging disabled.
- V-240258 High Lighttpd must be configured to utilize the Common Information Model Object Manager.
- V-240259 Medium Lighttpd must restrict inbound connections from nonsecure zones.
- V-240260 Medium Lighttpd must be configured to use syslog.
- V-240261 Medium Lighttpd must be configured to use syslog.
- V-240262 Medium The web server must use a logging mechanism that is configured to provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity.
- V-240263 Medium Lighttpd audit records must be mapped to a time stamp.
- V-240264 Medium Lighttpd must record time stamps for log records to a minimum granularity of time.
- V-240265 Medium Lighttpd must prohibit non-privileged accounts from accessing the application, libraries, and configuration files.
- V-240266 Medium Lighttpd must not be configured to listen to unnecessary ports.
- V-240267 Medium Lighttpd must be configured with FIPS 140-2 compliant ciphers for https connections.
- V-240268 Medium Lighttpd must be protected from being stopped by a non-privileged user.
- V-240269 Medium Lighttpd must be configured to use the SSL engine.
- V-240270 Medium Lighttpd must be configured to use the SSL engine.
- V-240271 High Lighttpd must use an approved TLS version for encryption.
- V-240272 Medium Lighttpd must remove all export ciphers to transmitted information.
- V-240273 Medium Lighttpd must be configured to use SSL.
- V-240274 Medium Lighttpd must have the latest approved security-relevant software updates installed.
- V-240275 Medium Lighttpd must disable IP forwarding.
- V-258452 High The version of vRealize Automation 7.x Lighttpd running on the system must be a supported version.
Removed rules 62
- V-89219 Medium Lighttpd must limit the number of simultaneous requests.
- V-89221 Medium Lighttpd must be configured with FIPS 140-2 compliant ciphers for https connections.
- V-89223 Medium Lighttpd must be configured to use the SSL engine.
- V-89225 Medium Lighttpd must be configured to use mod_accesslog.
- V-89227 Medium Lighttpd must generate log records for system startup and shutdown.
- V-89229 Medium Lighttpd must capture, record, and log the IP address associated with a user session.
- V-89231 Medium Lighttpd must produce log records containing sufficient information to establish what type of events occurred.
- V-89233 Medium Lighttpd must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-89235 Medium Lighttpd must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-89237 Medium Lighttpd must produce log records containing sufficient information to establish the source of events.
- V-89239 Medium Lighttpd must produce log records containing sufficient information to establish the outcome (success or failure) of events.
- V-89241 Medium Lighttpd must have the correct ownership on the log files to ensure they are only be accessible by privileged users.
- V-89243 Medium Lighttpd must have the correct group-ownership on the log files to ensure they are only be accessible by privileged users.
- V-89245 Medium Lighttpd must have the correct permissions on the log files to ensure they are only be accessible by privileged users.
- V-89247 Medium Lighttpd must have the correct ownership on the log files to ensure they are protected from unauthorized modification.
- V-89249 Medium Lighttpd must have the correct ownership on the log files to ensure they are protected from unauthorized deletion.
- V-89251 Medium Lighttpd log data and records must be backed up onto a different system or media.
- V-89253 Medium Lighttpd files must be verified for their integrity before being added to a production web server.
- V-89255 Medium Lighttpd expansion modules must be verified for their integrity before being added to a production web server.
- V-89257 Medium Lighttpd must prohibit unnecessary services, functions or processes.
- V-89259 High Lighttpd must only contain components that are operationally necessary.
- V-89261 Medium Lighttpd must have MIME types for csh or sh shell programs disabled.
- V-89263 Medium Lighttpd must only enable mappings to necessary and approved scripts.
- V-89265 Medium Lighttpd must have resource mappings set to disable the serving of certain file types.
- V-89267 Medium Lighttpd must not have the Web Distributed Authoring (WebDAV) module installed.
- V-89269 Medium Lighttpd must not have the webdav configuration file included.
- V-89271 Medium Lighttpd must prevent hosted applications from exhausting system resources.
- V-89273 High Lighttpd must not use symbolic links in the Lighttpd web content directory tree.
- V-89275 Medium Lighttpd must be configured to use port 5480.
- V-89277 Medium Lighttpd must use SSL/TLS protocols in order to secure passwords during transmission from the client.
- V-89279 Medium Lighttpd must have private key access restricted.
- V-89281 Medium Lighttpd must be configured to use only FIPS 140-2 approved ciphers.
- V-89283 High Lighttpd must prohibit non-privileged accounts from accessing the directory tree, the shell, or other operating system functions and utilities.
- V-89285 High Lighttpd must have the latest version installed.
- V-89287 Medium The Lighttpd baseline must be maintained.
- V-89289 Medium Lighttpd must protect against or limit the effects of HTTP types of Denial of Service (DoS) attacks.
- V-89291 Medium Lighttpd must disable directory browsing.
- V-89293 Medium Lighttpd must not be configured to use mod_status.
- V-89295 Medium Lighttpd must have debug logging disabled.
- V-89297 High Lighttpd must be configured to utilize the Common Information Model Object Manager.
- V-89299 Medium The web server must use a logging mechanism that is configured to provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity.
- V-89301 Medium Lighttpd audit records must be mapped to a time stamp.
- V-89303 Medium Lighttpd must record time stamps for log records to a minimum granularity of time.
- V-89305 Medium Lighttpd must prohibit non-privileged accounts from accessing the application, libraries, and configuration files.
- V-89307 Medium Lighttpd must not be configured to listen to unnecessary ports.
- V-89309 Medium Lighttpd must be configured with FIPS 140-2 compliant ciphers for https connections.
- V-89311 Medium Lighttpd must be protected from being stopped by a non-privileged user.
- V-89313 Medium Lighttpd must be configured to use the SSL engine.
- V-89315 Medium Lighttpd must be configured to use the SSL engine.
- V-89317 High Lighttpd must use an approved TLS version for encryption.
- V-89319 Medium Lighttpd must remove all export ciphers to transmitted information.
- V-89321 Medium Lighttpd must be configured to use SSL.
- V-89323 Medium Lighttpd must have the latest approved security-relevant software updates installed.
- V-89325 Medium Lighttpd must disable IP forwarding.
- V-90325 Medium Lighttpd must have the correct group-ownership on the log files to ensure they are protected from unauthorized modification.
- V-90327 Medium Lighttpd must have the correct permissions on the log files to ensure they are protected from unauthorized modification.
- V-90329 Medium Lighttpd must have the correct group-ownership on the log files to ensure they are protected from unauthorized deletion.
- V-90331 Medium Lighttpd must have the correct permissions on the log files to ensure they are protected from unauthorized deletion.
- V-90333 Medium Lighttpd proxy settings must be configured.
- V-90335 Medium Lighttpd must restrict inbound connections from nonsecure zones.
- V-90337 Medium Lighttpd must be configured to use syslog.
- V-90339 Medium Lighttpd must be configured to use syslog.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-LI-000005
- Vuln IDs
-
- V-240215
- V-89219
- Rule IDs
-
- SV-240215r879511_rule
- SV-99869
Checks: C-43448r667820_chk
At the command prompt, execute the following command: grep 'server.max-connections = 1024' /opt/vmware/etc/lighttpd/lighttpd.conf If the "server.max-connections" is not set to "1024", commented out, or does not exist, this is a finding.
Fix: F-43407r667821_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following value: server.max-connections = 1024
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- VRAU-LI-000015
- Vuln IDs
-
- V-240216
- V-89221
- Rule IDs
-
- SV-240216r879519_rule
- SV-99871
Checks: C-43449r667823_chk
At the command prompt, execute the following command: grep '^ssl.cipher-list' /opt/vmware/etc/lighttpd/lighttpd.conf If the value ssl.cipher-list = "FIPS: +3DES:!aNULL" is not returned or commented out, this is a finding.
Fix: F-43408r667824_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: ssl.cipher-list = "FIPS: +3DES:!aNULL"
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- VRAU-LI-000020
- Vuln IDs
-
- V-240217
- V-89223
- Rule IDs
-
- SV-240217r879520_rule
- SV-99873
Checks: C-43450r667826_chk
At the command prompt, execute the following command: grep '^ssl.engine' /opt/vmware/etc/lighttpd/lighttpd.conf If the value "ssl.engine" is not set to "enable", this is a finding.
Fix: F-43409r667827_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following value: ssl.engine = "enable"
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VRAU-LI-000025
- Vuln IDs
-
- V-240218
- V-89225
- Rule IDs
-
- SV-240218r879521_rule
- SV-99875
Checks: C-43451r667829_chk
At the command prompt, execute the following command: cat /opt/vmware/etc/lighttpd/lighttpd.conf | awk '/server\.modules/,/\)/' If the value "mod_accesslog" is not listed, this is a finding.
Fix: F-43410r667830_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Navigate to and configure the "server.modules" section with the following value: mod_accesslog
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VRAU-LI-000035
- Vuln IDs
-
- V-240219
- V-89227
- Rule IDs
-
- SV-240219r879559_rule
- SV-99877
Checks: C-43452r667832_chk
At the command prompt, execute the following command: egrep 'server\sstarted|server\sstopped' /opt/vmware/var/log/lighttpd/error.log If server stopped and server started times are not listed, this is a finding.
Fix: F-43411r667833_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: server.errorlog = log_root + "/error.log"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VRAU-LI-000050
- Vuln IDs
-
- V-240220
- V-89231
- Rule IDs
-
- SV-240220r879563_rule
- SV-99881
Checks: C-43453r667835_chk
At the command prompt, execute the following command: tail -n 4 /opt/vmware/var/log/lighttpd/access.log If the GET or POST events do not exist in the access.log file, this is a finding.
Fix: F-43412r667836_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: $HTTP["url"] !~ "(.css|.jpg|.gif|.png|.ico)$" { accesslog.filename = log_root + "/access.log" }
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- VRAU-LI-000055
- Vuln IDs
-
- V-240221
- V-89233
- Rule IDs
-
- SV-240221r879564_rule
- SV-99883
Checks: C-43454r667838_chk
At the command prompt, execute the following command: tail -n 1 /opt/vmware/var/log/lighttpd/access.log If the generated log records do not have date and time data, this is a finding.
Fix: F-43413r667839_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: $HTTP["url"] !~ "(.css|.jpg|.gif|.png|.ico)$" { accesslog.filename = log_root + "/access.log" }
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- VRAU-LI-000060
- Vuln IDs
-
- V-240222
- V-89235
- Rule IDs
-
- SV-240222r879565_rule
- SV-99885
Checks: C-43455r667841_chk
At the command prompt, execute the following command: tail -n 1 /opt/vmware/var/log/lighttpd/access.log If any of the generated audit records are without sufficient information to establish where the event occurred, this is a finding.
Fix: F-43414r667842_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: $HTTP["url"] !~ "(.css|.jpg|.gif|.png|.ico)$" { accesslog.filename = log_root + "/access.log" }
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-LI-000065
- Vuln IDs
-
- V-240223
- V-89237
- Rule IDs
-
- SV-240223r879566_rule
- SV-99887
Checks: C-43456r667844_chk
At the command prompt, execute the following command: tail -n 4 /opt/vmware/var/log/lighttpd/access.log If any of the generated audit records are without sufficient information to establish the source of the events, this is a finding.
Fix: F-43415r667845_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: $HTTP["url"] !~ "(.css|.jpg|.gif|.png|.ico)$" { accesslog.filename = log_root + "/access.log" }
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- VRAU-LI-000075
- Vuln IDs
-
- V-240224
- V-89239
- Rule IDs
-
- SV-240224r879567_rule
- SV-99889
Checks: C-43457r668003_chk
At the command prompt, execute the following command: Note: The HTTP status code indicating success or failure is a 3-digit integer immediately after "HTTP/1.1". Any value other than a 3-digit code immediately following "HTTP/1.1" is a failure of the logging process. tail -n 4 /opt/vmware/var/log/lighttpd/access.log If any of the generated audit records are without sufficient information to establish the outcome of the event (success or failure), this is a finding.
Fix: F-43416r667848_fix
Navigate to and open the /opt/vmware/etc/lighttpd/lighttpd.conf file Configure the "lighttpd.conf" file with the following: $HTTP["url"] !~ "(.css|.jpg|.gif|.png|.ico)$" { accesslog.filename = log_root + "/access.log" }
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VRAU-LI-000095
- Vuln IDs
-
- V-240225
- V-89241
- Rule IDs
-
- SV-240225r879576_rule
- SV-99891
Checks: C-43458r667850_chk
At the command prompt, execute the following command: ls -l /opt/vmware/var/log/lighttpd/*.log If the owner is not "root", this is a finding.
Fix: F-43417r667851_fix
At the command prompt, enter the following command: chown root:root /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VRAU-LI-000100
- Vuln IDs
-
- V-240226
- V-89243
- Rule IDs
-
- SV-240226r879576_rule
- SV-99893
Checks: C-43459r667853_chk
At the command prompt, execute the following command: ls -l /opt/vmware/var/log/lighttpd/*.log If the group-owner is not "root", this is a finding.
Fix: F-43418r667854_fix
At the command prompt, enter the following command: chown root:root /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VRAU-LI-000105
- Vuln IDs
-
- V-240227
- V-89245
- Rule IDs
-
- SV-240227r879576_rule
- SV-99895
Checks: C-43460r667856_chk
At the command prompt, execute the following command: ls -l /opt/vmware/var/log/lighttpd/*.log If permissions on the log files are not "-rw-r----- (640)", this is a finding.
Fix: F-43419r667857_fix
At the command prompt, enter the following command: chmod 640 /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VRAU-LI-000110
- Vuln IDs
-
- V-240228
- V-89247
- Rule IDs
-
- SV-240228r879577_rule
- SV-99897
Checks: C-43461r667859_chk
At the command prompt, execute the following command: ls -l /opt/vmware/var/log/lighttpd/*.log If the owner is not "root", this is a finding.
Fix: F-43420r667860_fix
At the command prompt, enter the following commands: chown root:root /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VRAU-LI-000115
- Vuln IDs
-
- V-240229
- V-90325
- Rule IDs
-
- SV-240229r879577_rule
- SV-100975
Checks: C-43462r667862_chk
At the command prompt, execute the following command: ls -l /opt/vmware/var/log/lighttpd/*.log If the group-owner is not "root", this is a finding.
Fix: F-43421r667863_fix
At the command prompt, enter the following command: chown root:root /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VRAU-LI-000120
- Vuln IDs
-
- V-240230
- V-90327
- Rule IDs
-
- SV-240230r879577_rule
- SV-100977
Checks: C-43463r667865_chk
At the command prompt, execute the following command: ls -l /opt/vmware/var/log/lighttpd/*.log If permissions on the log files are not "-rw-r----- (640)", this is a finding.
Fix: F-43422r667866_fix
At the command prompt, enter the following command: chmod 640 /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VRAU-LI-000125
- Vuln IDs
-
- V-240231
- V-89249
- Rule IDs
-
- SV-240231r879578_rule
- SV-99899
Checks: C-43464r667868_chk
At the command prompt, execute the following command: ls -l /opt/vmware/var/log/lighttpd/*.log If the owner is not "root", this is a finding.
Fix: F-43423r667869_fix
At the command prompt, enter the following commands: chown root:root /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VRAU-LI-000130
- Vuln IDs
-
- V-240232
- V-90329
- Rule IDs
-
- SV-240232r879578_rule
- SV-100979
Checks: C-43465r667871_chk
At the command prompt, execute the following command: ls -l /opt/vmware/var/log/lighttpd/*.log If the group-owner is not "root", this is a finding.
Fix: F-43424r667872_fix
At the command prompt, enter the following command: chown root:root /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VRAU-LI-000135
- Vuln IDs
-
- V-240233
- V-90331
- Rule IDs
-
- SV-240233r879578_rule
- SV-100981
Checks: C-43466r667874_chk
At the command prompt, execute the following command: ls -l /opt/vmware/var/log/lighttpd/*.log If permissions on the log files are not "-rw-r----- (640)", this is a finding.
Fix: F-43425r667875_fix
At the command prompt, enter the following command: chmod 640 /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- VRAU-LI-000140
- Vuln IDs
-
- V-240234
- V-89251
- Rule IDs
-
- SV-240234r879582_rule
- SV-99901
Checks: C-43467r668005_chk
Obtain supporting documentation from the ISSO. Determine whether log data and records are being backed up to a different system or separate media. If log data and records are not being backed up to a different system or separate media, this is a finding.
Fix: F-43426r667878_fix
Backup the log data and records to a different system or separate media.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VRAU-LI-000145
- Vuln IDs
-
- V-240235
- V-89253
- Rule IDs
-
- SV-240235r879584_rule
- SV-99903
Checks: C-43468r854808_chk
Obtain supporting documentation from the ISSO. Determine whether web server files are verified/validated before being implemented into the production environment. If the web server files are not verified or validated before being implemented into the production environment, this is a finding.
Fix: F-43427r667881_fix
Verify or validate the web server files for integrity before being implemented the production environment.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VRAU-LI-000150
- Vuln IDs
-
- V-240236
- V-89255
- Rule IDs
-
- SV-240236r879584_rule
- SV-99905
Checks: C-43469r854810_chk
Obtain supporting documentation from the ISSO. Determine whether expansion modules are being fully reviewed, tested, and signed before being implemented into the production environment. If the expansion modules are not being fully reviewed, tested, and signed before being implemented into the production environment, this is a finding.
Fix: F-43428r667884_fix
Review, test, and sign expansion modules before being implemented into the production environment.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-LI-000160
- Vuln IDs
-
- V-240237
- V-89257
- Rule IDs
-
- SV-240237r879587_rule
- SV-99907
Checks: C-43470r667886_chk
Obtain supporting documentation from the ISSO. Determine if any unnecessary services, functions or processes are running on the web server. If any unnecessary services, functions or processes are running on the web server, this is a finding.
Fix: F-43429r667887_fix
Remove or disable any unnecessary services, functions or processes.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-LI-000165
- Vuln IDs
-
- V-240238
- V-90333
- Rule IDs
-
- SV-240238r879587_rule
- SV-100983
Checks: C-43471r668031_chk
At the command prompt, execute the following command: grep -A 6 -B 1 proxy.server /opt/vmware/etc/lighttpd/lighttpd.conf If the proxy.server "host" value is not set to "127.0.0.1" and the proxy.server "port" value is not set to "5488", this is a finding.
Fix: F-43430r668032_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Navigate to proxy.server. Set the proxy.server "host" value to "127.0.0.1" and the proxy.server "port" value to "5488". Note: The proxy.server section should look like this when it is configured: $HTTP["url"] =~ "^/cimom" { proxy.server = ( "" => (( "host" => "127.0.0.1", "port" => "5488" )) ) }
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- VRAU-LI-000170
- Vuln IDs
-
- V-240239
- V-89259
- Rule IDs
-
- SV-240239r879587_rule
- SV-99909
Checks: C-43472r668011_chk
Obtain supporting documentation from the ISSO. Determine if web server documentation, sample code, example applications, or tutorials has been deleted or removed and only contains components that are operationally necessary. If web server documentation, sample code, example applications, or tutorials has not been deleted or removed and contains components that are not operationally necessary, this is a finding.
Fix: F-43431r667893_fix
Delete or remove any documentation, sample code, example applications, tutorials and any components that are not operationally necessary.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-LI-000185
- Vuln IDs
-
- V-240240
- V-89261
- Rule IDs
-
- SV-240240r879587_rule
- SV-99911
Checks: C-43473r667895_chk
At the command prompt, execute the following command: cat /opt/vmware/etc/lighttpd/lighttpd.conf | egrep '".sh"|".csh"' If the command returns any value, this is a finding.
Fix: F-43432r667896_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Delete any line(s) that return the value of csh or sh.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-LI-000190
- Vuln IDs
-
- V-240241
- V-89263
- Rule IDs
-
- SV-240241r879587_rule
- SV-99913
Checks: C-43474r668013_chk
Obtain supporting documentation from the ISSO. Determine the scripts that are deemed necessary and approved (whitelist). Note: Lighttpd provides the cgi.assign parameter to specify script mappings. Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file Navigate to the cgi.assign parameter. If cgi.assign parameter is configured with script types that are deemed for denial, this is a finding.
Fix: F-43433r667899_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file Navigate to the cgi.assign parameter. Configure the cgi.assign parameter with the scripts that are deemed necessary and approved (whitelisted).
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-LI-000195
- Vuln IDs
-
- V-240242
- V-89265
- Rule IDs
-
- SV-240242r879587_rule
- SV-99915
Checks: C-43475r668015_chk
Obtain supporting documentation from the ISSO. Determine the file types (blacklist) that are deemed for denial. Note: Lighttpd provides the url.access-deny parameter to specify the blacklist of files. Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file Navigate to the url.access-deny parameter. If url.access-deny parameter is not configured with the file types that are blacklisted, this is a finding. If url.access-deny parameter is not set properly, this is a finding.
Fix: F-43434r667902_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file Navigate to the url.access-deny parameter. Configure the url.access-deny parameter with the file types that are blacklisted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-LI-000200
- Vuln IDs
-
- V-240243
- V-89267
- Rule IDs
-
- SV-240243r879587_rule
- SV-99917
Checks: C-43476r667904_chk
At the command prompt, execute the following command: cat /opt/vmware/etc/lighttpd/lighttpd.conf | awk '/server\.modules/,/\)/' If the value "mod_webdav" module is listed, this is a finding.
Fix: F-43435r667905_fix
Navigate to and open the /opt/vmware/etc/lighttpd/lighttpd.conf file Navigate to the server.modules section. In the server.modules section, delete the "mod_webdav" entry.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-LI-000205
- Vuln IDs
-
- V-240244
- V-89269
- Rule IDs
-
- SV-240244r879587_rule
- SV-99919
Checks: C-43477r667907_chk
At the command prompt, execute the following command: grep 'webdav.conf' /opt/vmware/etc/lighttpd/lighttpd.conf If the return value is an include statement and it is not commented out, this is a finding.
Fix: F-43436r667908_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Delete or comment out the include "conf.d/webdav.conf" statement.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-LI-000210
- Vuln IDs
-
- V-240245
- V-89271
- Rule IDs
-
- SV-240245r879587_rule
- SV-99921
Checks: C-43478r667910_chk
At the command prompt, execute the following command: grep '^server.max-keep-alive-idle' /opt/vmware/etc/lighttpd/lighttpd.conf If the "server.max-keep-alive-idle" is not set to "30", this is a finding.
Fix: F-43437r667911_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file Configure the lighttpd.conf file with the following: server.max-keep-alive-idle = 30
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- VRAU-LI-000215
- Vuln IDs
-
- V-240246
- V-89273
- Rule IDs
-
- SV-240246r879587_rule
- SV-99923
Checks: C-43479r667913_chk
At the command prompt, execute the following command: find /opt/vmware/share/htdocs -type l If any files are listed, this is a finding.
Fix: F-43438r667914_fix
At the command prompt, enter the following commands: Note: Replace <file_name> for the name of any files that were returned. unlink <file_name> Repeat the commands for each file that was listed.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- VRAU-LI-000220
- Vuln IDs
-
- V-240247
- V-89275
- Rule IDs
-
- SV-240247r879588_rule
- SV-99925
Checks: C-43480r667916_chk
At the command prompt, execute the following command: grep '^server.port' /opt/vmware/etc/lighttpd/lighttpd.conf If the value of "server.port" is not "5480", this is a finding.
Fix: F-43439r667917_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file Configure the lighttpd.conf file with the following: server.port = 5480
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- VRAU-LI-000225
- Vuln IDs
-
- V-240248
- V-89277
- Rule IDs
-
- SV-240248r879609_rule
- SV-99927
Checks: C-43481r667919_chk
At the command prompt, execute the following command: grep '^ssl.engine' /opt/vmware/etc/lighttpd/lighttpd.conf If the value of "ssl.engine" is not set to "enable", this is a finding.
Fix: F-43440r667920_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file Configure the lighttpd.conf file with the following: ssl.engine = "enable"
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- VRAU-LI-000235
- Vuln IDs
-
- V-240249
- V-89279
- Rule IDs
-
- SV-240249r879613_rule
- SV-99929
Checks: C-43482r667922_chk
At the command prompt, execute the following command: ls -al /opt/vmware/etc/lighttpd/server.pem If the "server.pem" file is not owned by "root" or the file permissions are not "400", this is a finding.
Fix: F-43441r667923_fix
At the command prompt, execute the following commands: chown root:root /opt/vmware/etc/lighttpd/server.pem chmod 400 /opt/vmware/etc/lighttpd/server.pem
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- VRAU-LI-000245
- Vuln IDs
-
- V-240250
- V-89281
- Rule IDs
-
- SV-240250r879616_rule
- SV-99931
Checks: C-43483r667925_chk
At the command prompt, execute the following command: grep 'ssl.cipher-list' /opt/vmware/etc/lighttpd/lighttpd.conf If the return value for "ssl.cipher-list" is not set to "FIPS: +3DES:!aNULL", this is a finding.
Fix: F-43442r667926_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file Configure the lighttpd.conf file with the following: ssl.cipher-list = "FIPS: +3DES:!aNULL"
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-LI-000255
- Vuln IDs
-
- V-240251
- V-89283
- Rule IDs
-
- SV-240251r879631_rule
- SV-99933
Checks: C-43484r668017_chk
At the command prompt, execute the following command: stat -c "%a %g %G %n" `find /opt/vmware/share/htdocs /opt/vmware/etc/lighttpd /opt/vmware/share/lighttpd -type f` | awk '$1 !~ /^..0/ || $3 !~ /root/ {print}' If any files are returned, this is a finding.
Fix: F-43443r667929_fix
At the command prompt, execute the following commands: Note: Replace <file_name> for the name of the file that was returned. chown root:root <file_name> chmod 640 <file_name> Repeat the commands for each file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-LI-000260
- Vuln IDs
-
- V-240252
- V-89285
- Rule IDs
-
- SV-240252r879631_rule
- SV-99935
Checks: C-43485r667931_chk
At the command prompt, execute the following command: /opt/vmware/sbin/vami-lighttpd -v If the Lighttpd version does not have the latest version installed, this is a finding.
Fix: F-43444r667932_fix
Install the latest version.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-LI-000310
- Vuln IDs
-
- V-240253
- V-89287
- Rule IDs
-
- SV-240253r879640_rule
- SV-99937
Checks: C-43486r667934_chk
Obtain supporting documentation from the ISSO. Determine if a software baseline is being maintained. If a baseline is not being maintained, this is a finding.
Fix: F-43445r667935_fix
Update the software baseline.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- VRAU-LI-000335
- Vuln IDs
-
- V-240254
- V-89289
- Rule IDs
-
- SV-240254r879650_rule
- SV-99939
Checks: C-43487r667937_chk
At the command prompt, execute the following command: grep '^server.max-fds' /opt/vmware/etc/lighttpd/lighttpd.conf If the value for "server.max-fds" is not set to "2048", this is a finding.
Fix: F-43446r667938_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: server.max-fds = 2048
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-LI-000345
- Vuln IDs
-
- V-240255
- V-89291
- Rule IDs
-
- SV-240255r879655_rule
- SV-99941
Checks: C-43488r667940_chk
At the command prompt, execute the following command: grep '^dir-listing.activate' /opt/vmware/etc/lighttpd/lighttpd.conf If the value for "dir-listing.activate" is not set to "disable", this is a finding.
Fix: F-43447r667941_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: dir-listing.activate = "disable"
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-LI-000350
- Vuln IDs
-
- V-240256
- V-89293
- Rule IDs
-
- SV-240256r879655_rule
- SV-99943
Checks: C-43489r667943_chk
At the command prompt, execute the following command: cat /opt/vmware/etc/lighttpd/lighttpd.conf | awk '/server\.modules/,/\)/' If the "mod_status" module is listed, this is a finding.
Fix: F-43448r667944_fix
Navigate to and open the /opt/vmware/etc/lighttpd/lighttpd.conf file Navigate to the "server.modules" section. In the "server.modules" section, delete the "mod_status" entry.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-LI-000355
- Vuln IDs
-
- V-240257
- V-89295
- Rule IDs
-
- SV-240257r879655_rule
- SV-99945
Checks: C-43490r667946_chk
At the command prompt, execute the following command: grep '^debug.log-request-handling' /opt/vmware/etc/lighttpd/lighttpd.conf If the value for "debug.log-request-handling" is not set to "disable", this is a finding.
Fix: F-43449r667947_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: debug.log-request-handling = "disable"
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-002314
- Version
- VRAU-LI-000370
- Vuln IDs
-
- V-240258
- V-89297
- Rule IDs
-
- SV-240258r879692_rule
- SV-99947
Checks: C-43491r854812_chk
At the command prompt, execute the following command: cat /opt/vmware/etc/lighttpd/lighttpd.conf | awk '/cimom/,/}/' Note: The return value should produce the following output: $HTTP["url"] =~ "^/cimom" { proxy.server = ( "" => (( "host" => "127.0.0.1", "port" => "5488" )) ) } If the return value does not match the above output, this is a finding.
Fix: F-43450r854813_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the lighttpd.conf with the following: $HTTP["url"] =~ "^/cimom" { proxy.server = ( "" => (( "host" => "127.0.0.1", "port" => "5488" )) ) }
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- VRAU-LI-000375
- Vuln IDs
-
- V-240259
- V-90335
- Rule IDs
-
- SV-240259r879692_rule
- SV-100985
Checks: C-43492r854815_chk
At the command prompt, execute the following command: grep -A 4 'remoteip' /opt/vmware/etc/lighttpd/lighttpd.conf If the command does not return any output, this is a finding. Note: The output should look like the following: $HTTP["remoteip"] !~ "a.a.a.a" { url.access-deny = ( "" ) } Where a.a.a.a is an allowed IP address.
Fix: F-43451r854816_fix
Determine the IP addresses which will be allowed to access Lighttpd. Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: $HTTP["remoteip"] !~ "a.a.a.a" { url.access-deny = ( "" ) } Note: a.a.a.a is the IPv4 address provided by the ISSO. If additional IPv4 addresses are allowed, use the information shown below instead (3 addresses shown): $HTTP["remoteip"] !~ "a.a.a.a|b.b.b.b|c.c.c.c" { url.access-deny = ( "" ) }
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- VRAU-LI-000400
- Vuln IDs
-
- V-240260
- V-90337
- Rule IDs
-
- SV-240260r879731_rule
- SV-100987
Checks: C-43493r667955_chk
At the command prompt, execute the following command: grep 'accesslog.use-syslog' /opt/vmware/etc/lighttpd/lighttpd.conf | grep -v ^# If the value for "accesslog.use-syslog" is not set to "enable" or is missing, this is a finding.
Fix: F-43452r667956_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the lighttpd.conf file with the following: accesslog.use-syslog = "enable"
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- VRAU-LI-000405
- Vuln IDs
-
- V-240261
- V-90339
- Rule IDs
-
- SV-240261r879731_rule
- SV-100989
Checks: C-43494r667958_chk
At the command prompt, execute the following command: grep 'accesslog.use-syslog' /opt/vmware/etc/lighttpd/lighttpd.conf | grep -v ^# If the value for "accesslog.use-syslog" is not set to "enable" or is missing, this is a finding.
Fix: F-43453r667959_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the lighttpd.conf file with the following: accesslog.use-syslog = "enable"
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- VRAU-LI-000410
- Vuln IDs
-
- V-240262
- V-89299
- Rule IDs
-
- SV-240262r879732_rule
- SV-99949
Checks: C-43495r667961_chk
At the command prompt, execute the following command: grep 'accesslog.use-syslog' /opt/vmware/etc/lighttpd/lighttpd.conf | grep -v ^# If the value for "accesslog.use-syslog" is not set to "enable" or is missing, this is a finding.
Fix: F-43454r667962_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the lighttpd.conf file with the following: accesslog.use-syslog = "enable"
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- VRAU-LI-000415
- Vuln IDs
-
- V-240263
- V-89301
- Rule IDs
-
- SV-240263r879747_rule
- SV-99951
Checks: C-43496r667964_chk
At the command prompt, execute the following command: grep 'accesslog.format' /opt/vmware/etc/lighttpd/lighttpd.conf | grep -v ^# If no value is returned or if the "accesslog.format" is commented out, this is a finding.
Fix: F-43455r854821_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Note: If the accesslog.format setting was commented out with a '#' sign, remove the '#' sign. Configure the lighttpd.conf file with the following: accesslog.format = "%h %l %u %t \"%r\" %b %>s \"%{User-Agent}i\" \"%{Referer}i\""
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- VRAU-LI-000420
- Vuln IDs
-
- V-240264
- V-89303
- Rule IDs
-
- SV-240264r879748_rule
- SV-99953
Checks: C-43497r667967_chk
At the command prompt, execute the following command: grep 'accesslog.format' /opt/vmware/etc/lighttpd/lighttpd.conf | grep -v ^# If no value is returned or if the "accesslog.format" is commented out, this is a finding.
Fix: F-43456r854823_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Note: If the accesslog.format setting was commented out with a '#' sign, remove the '#' sign. Configure the lighttpd.conf file with the following: accesslog.format = "%h %l %u %t \"%r\" %b %>s \"%{User-Agent}i\" \"%{Referer}i\""
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VRAU-LI-000425
- Vuln IDs
-
- V-240265
- V-89305
- Rule IDs
-
- SV-240265r879753_rule
- SV-99955
Checks: C-43498r854825_chk
At the command prompt, execute the following command: stat -c "%a %g %G %n" `find /opt/vmware/share/htdocs /opt/vmware/etc/lighttpd /opt/vmware/share/lighttpd -type f` | awk '$1 !~ /^..0/ || $3 !~ /root/ {print}' If any files are returned, this is a finding.
Fix: F-43457r667971_fix
At the command prompt, enter the followings commands: Note: Replace <file_name> for the name of the file that was returned. chown root:root <file_name> chmod 640 <file_name> Repeat the commands for each file that was returned.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VRAU-LI-000430
- Vuln IDs
-
- V-240266
- V-89307
- Rule IDs
-
- SV-240266r879756_rule
- SV-99957
Checks: C-43499r667973_chk
At the command prompt, execute the following command: cat /opt/vmware/etc/lighttpd/lighttpd.conf | awk '$0 ~ /server\.port/ { print }' If any value returned other than "server.port=5480", this is a finding.
Fix: F-43458r667974_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Note: Do not delete the entry for "server.port=5480" Delete all other server.port entries.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- VRAU-LI-000435
- Vuln IDs
-
- V-240267
- V-89309
- Rule IDs
-
- SV-240267r879944_rule
- SV-99959
Checks: C-43500r667976_chk
At the command prompt, execute the following command: grep '^ssl.cipher-list' /opt/vmware/etc/lighttpd/lighttpd.conf If the value returned in not "ssl.cipher-list = "FIPS: +3DES:!aNULL" "or is commented out, this is a finding.
Fix: F-43459r667977_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following: ssl.cipher-list = "FIPS: +3DES:!aNULL"
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VRAU-LI-000450
- Vuln IDs
-
- V-240268
- V-89311
- Rule IDs
-
- SV-240268r879806_rule
- SV-99961
Checks: C-43501r667979_chk
At the command prompt, execute the following command: ps -f -U root | awk '$0 ~ /vami-lighttpd/ && $0 !~ /awk/ {print}' If the "vami-lighttpd" process is not owned by "root", this is a finding.
Fix: F-43460r667980_fix
Note: The following command must be ran as root. At the command prompt, execute the following command: /opt/vmware/etc/init.d/vami-lighttpd restart
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-LI-000460
- Vuln IDs
-
- V-240269
- V-89313
- Rule IDs
-
- SV-240269r928837_rule
- SV-99963
Checks: C-43502r667982_chk
At the command prompt, execute the following command: $ grep '^ssl.engine' /opt/vmware/etc/lighttpd/lighttpd.conf If the value returned for "ssl.engine" is not set to "enable", this is a finding.
Fix: F-43461r667983_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following value: ssl.engine = "enable"
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-LI-000465
- Vuln IDs
-
- V-240270
- V-89315
- Rule IDs
-
- SV-240270r879810_rule
- SV-99965
Checks: C-43503r667985_chk
At the command prompt, execute the following command: $ grep '^ssl.engine' /opt/vmware/etc/lighttpd/lighttpd.conf If the value returned for "ssl.engine" is not set to "enable", this is a finding.
Fix: F-43462r667986_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the "lighttpd.conf" file with the following value: ssl.engine = "enable"
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- VRAU-LI-000485
- Vuln IDs
-
- V-240271
- V-89317
- Rule IDs
-
- SV-240271r879810_rule
- SV-99967
Checks: C-43504r854832_chk
At the command prompt, execute the following command: Note: The command should return 2 outputs: ssl.use-sslv2 and ssl.use-sslv3 grep '^ssl.use-sslv' /opt/vmware/etc/lighttpd/lighttpd.conf If the value returned for "ssl.use-sslv2" and "ssl.use-sslv3" are not set to "disable", this is a finding.
Fix: F-43463r667989_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the lighttpd.conf file with following: ssl.use-sslv2 = "disable" ssl.use-sslv3 = "disable"
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-LI-000490
- Vuln IDs
-
- V-240272
- V-89319
- Rule IDs
-
- SV-240272r879810_rule
- SV-99969
Checks: C-43505r667991_chk
At the command prompt, execute the following command: grep '^ssl.cipher-list' /opt/vmware/etc/lighttpd/lighttpd.conf If the value returned in not "ssl.cipher-list = "FIPS: +3DES:!aNULL" "or is commented out, this is a finding.
Fix: F-43464r667992_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the lighttpd.conf file with the following: ssl.cipher-list = "FIPS: +3DES:!aNULL"
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- VRAU-LI-000500
- Vuln IDs
-
- V-240273
- V-89321
- Rule IDs
-
- SV-240273r879813_rule
- SV-99971
Checks: C-43506r667994_chk
At the command prompt, execute the following command: $ grep '^ssl.engine' /opt/vmware/etc/lighttpd/lighttpd.conf If the value for "ssl.engine" is not set to "enable", this is a finding.
Fix: F-43465r667995_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf Configure the lighttpd.conf file with the following value: ssl.engine = "enable"
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- VRAU-LI-000505
- Vuln IDs
-
- V-240274
- V-89323
- Rule IDs
-
- SV-240274r879827_rule
- SV-99973
Checks: C-43507r667997_chk
Obtain supporting documentation from the ISSO. Determine whether Lighttpd has the latest approved security-relevant software updates installed. If the latest approved security-relevant software updates are not installed, this is a finding.
Fix: F-43466r667998_fix
Install the latest approved security-relevant software updates.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VRAU-LI-000515
- Vuln IDs
-
- V-240275
- V-89325
- Rule IDs
-
- SV-240275r879887_rule
- SV-99975
Checks: C-43508r668000_chk
At the command prompt, execute the following command: grep -E 'url\.redirect' /opt/vmware/etc/lighttpd/lighttpd.conf | grep -v '^#' If any values are returned, this is a finding.
Fix: F-43467r668001_fix
Navigate to /opt/vmware/etc/lighttpd/lighttpd.conf In the "lighttpd.conf" file, delete all lines that are returned containing url.redirect returned.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VRAU-LI-009999
- Vuln IDs
-
- V-258452
- Rule IDs
-
- SV-258452r928883_rule
Checks: C-62192r928882_chk
vRealize Automation 7.x Lighttpd is no longer supported by the vendor. If the system is running vRealize Automation 7.x Lighttpd, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.