VMware vSphere 6.7 Perfcharts Tomcat Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 5
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 5
- V-239405 Medium fix Performance Charts must protect cookies from cross-site scripting (XSS).
- V-239406 Medium checkfix Performance Charts must record user access in a format that enables monitoring of remote access.
- V-239421 Medium checkfix Performance Charts must use the "setCharacterEncodingFilter" filter.
- V-239424 Medium check Performance Charts must be configured to show error pages with minimal information.
- V-239429 Medium fix Performance Charts must be configured with the appropriate ports.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCPF-67-000001
- Vuln IDs
-
- V-239402
- Rule IDs
-
- SV-239402r674929_rule
Checks: C-42635r674927_chk
At the command prompt, execute the following command: # xmllint --xpath '/Server/Service/Connector/@connectionTimeout' /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml Expected result: connectionTimeout="20000" If the output does not match the expected result, this is a finding.
Fix: F-42594r674928_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value: connectionTimeout="20000"
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCPF-67-000002
- Vuln IDs
-
- V-239403
- Rule IDs
-
- SV-239403r717041_rule
Checks: C-42636r674930_chk
At the command prompt, execute the following command: # xmllint --xpath '/Server/Service/Executor/@maxThreads' /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml Expected result: maxThreads="300" If the output does not match the expected result, this is a finding.
Fix: F-42595r674931_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml. Navigate to the <Executor> mode with the name of "tomcatThreadPool" and configure with the value 'maxThreads="300"'. Note: The <Executor> node should be configured as follows: <Executor maxThreads="300" minSpareThreads="50" name="tomcatThreadPool" namePrefix="tomcat-http--"/>
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCPF-67-000003
- Vuln IDs
-
- V-239404
- Rule IDs
-
- SV-239404r674935_rule
Checks: C-42637r674933_chk
At the command prompt, execute the following command: # xmllint --xpath '/Server/Service/Connector/@maxPostSize' /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml Expected result: XPath set is empty If the output does not match the expected result, this is a finding.
Fix: F-42596r674934_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml. Navigate to each of the <Connector> nodes. Remove any configuration for "maxPostSize".
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCPF-67-000004
- Vuln IDs
-
- V-239405
- Rule IDs
-
- SV-239405r816582_rule
Checks: C-42638r674936_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-perfcharts/tc-instance/webapps/statsreport/WEB-INF/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/http-only' - Expected result: <http-only>true</http-only> If the output does not match the expected result, this is a finding.
Fix: F-42597r816581_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/webapps/statsreport/WEB-INF/web.xml. Navigate to the <session-config> node and configure it as follows: <session-config> <cookie-config> <http-only>true</http-only> <secure>true</secure> </cookie-config> <session-timeout>6</session-timeout> </session-config>
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VCPF-67-000005
- Vuln IDs
-
- V-239406
- Rule IDs
-
- SV-239406r816585_rule
Checks: C-42639r816583_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Engine/Host/Valve[@className="org.apache.catalina.valves.AccessLogValve"]'/@pattern - Expected result: pattern="%h %{X-Forwarded-For}i %l %u %t &quot;%r&quot; %s %b &quot;%{User-Agent}i&quot;" If the output does not match the expected result, this is a finding.
Fix: F-42598r816584_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml. Inside the <Host> node, add the "AccessLogValve" <Valve> node entirely if it does not exist or update the existing pattern to match the following line: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="${vim.logdir}" pattern="%h %{X-Forwarded-For}i %l %u %t "%r" %s %b "%{User-Agent}i"" prefix="localhost_access_log" suffix=".txt"/>
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VCPF-67-000006
- Vuln IDs
-
- V-239407
- Rule IDs
-
- SV-239407r674944_rule
Checks: C-42640r674942_chk
At the command prompt, execute the following command: # grep StreamRedirectFile /etc/vmware/vmware-vmon/svcCfgfiles/perfcharts.json Expected result: "StreamRedirectFile" : "%VMWARE_LOG_DIR%/vmware/perfcharts/vmware-perfcharts-runtime.log", If the output does not match the expected result, this is a finding.
Fix: F-42599r674943_fix
Navigate to and open /etc/vmware/vmware-vmon/svcCfgfiles/perfcharts.json. Below the last line of the "PreStartCommandArg" block, add the following line: "StreamRedirectFile" : "%VMWARE_LOG_DIR%/vmware/perfcharts/vmware-perfcharts-runtime.log", Restart the appliance for changes to take effect.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VCPF-67-000007
- Vuln IDs
-
- V-239408
- Rule IDs
-
- SV-239408r674947_rule
Checks: C-42641r674945_chk
At the command prompt, execute the following command: # find /storage/log/vmware/perfcharts/ -xdev -type f -a '(' -perm -o+w -o -not -user root -o -not -group root ')' -exec ls -ld {} \; If any files are returned, this is a finding.
Fix: F-42600r674946_fix
At the command prompt, execute the following commands: # chmod o-w <file> # chown root:root <file> Note: Substitute <file> with the listed file.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCPF-67-000008
- Vuln IDs
-
- V-239409
- Rule IDs
-
- SV-239409r674950_rule
Checks: C-42642r674948_chk
At the command prompt, execute the following command: # rpm -V VMware-perfcharts|grep "^..5......"|grep "/usr/lib"|grep -v -E "\.properties|\.conf|\.xml" If any files are returned, this is a finding.
Fix: F-42601r674949_fix
Reinstall the VCSA or roll back to a snapshot. Modifying the Performance Charts installation files manually is not supported by VMware.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCPF-67-000009
- Vuln IDs
-
- V-239410
- Rule IDs
-
- SV-239410r674953_rule
Checks: C-42643r674951_chk
At the command prompt, execute the following command: # ls -A /usr/lib/vmware-perfcharts/tc-instance/webapps Expected result: statsreport If the output does not match the expected result, this is a finding.
Fix: F-42602r674952_fix
For each unexpected directory returned in the check, run the following command: # rm /usr/lib/vmware-sso/vmware-sts/webapps/<NAME> Restart the service with the following command: # service-control --restart vmware-perfcharts
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCPF-67-000010
- Vuln IDs
-
- V-239411
- Rule IDs
-
- SV-239411r674956_rule
Checks: C-42644r674954_chk
At the command prompt, execute the following command: # grep UserDatabaseRealm /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml If the command produces any output, this is a finding.
Fix: F-42603r674955_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml. Remove the <Realm> node returned in the check.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCPF-67-000011
- Vuln IDs
-
- V-239412
- Rule IDs
-
- SV-239412r674959_rule
Checks: C-42645r674957_chk
At the command prompt, execute the following command: # grep -En '(x-csh<)|(x-sh<)|(x-shar<)|(x-ksh<)' /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml If the command produces any output, this is a finding.
Fix: F-42604r674958_fix
Open /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml in a text editor. Remove any and all of the following nodes lines: <mime-type>application/x-csh</mime-type> <mime-type>application/x-shar</mime-type> <mime-type>application/x-sh</mime-type> <mime-type>application/x-ksh</mime-type>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCPF-67-000012
- Vuln IDs
-
- V-239413
- Rule IDs
-
- SV-239413r674962_rule
Checks: C-42646r674960_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/servlet-mapping/servlet-name[text()="jsp"]/parent::servlet-mapping' - Expected result: <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping> If the output of the command does not match the expected result, this is a finding.
Fix: F-42605r674961_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml. Inside the <web-app> parent node, add the following: <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCPF-67-000013
- Vuln IDs
-
- V-239414
- Rule IDs
-
- SV-239414r674965_rule
Checks: C-42647r674963_chk
At the command prompt, execute the following command: # grep -n 'webdav' /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml If the command produces any output, this is a finding.
Fix: F-42606r674964_fix
Open /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml in a text editor. Find the <servlet-name>webdav</servlet-name> node and remove the entire parent <servlet> block. Find the <servlet-name>webdav</servlet-name> node and remove the entire parent <servlet-mapping> block.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCPF-67-000014
- Vuln IDs
-
- V-239415
- Rule IDs
-
- SV-239415r674968_rule
Checks: C-42648r674966_chk
At the command prompt, execute the following command: # grep JreMemoryLeakPreventionListener /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml Expected result: <Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/> If the output of the command does not match the expected result, this is a finding.
Fix: F-42607r674967_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml. Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCPF-67-000015
- Vuln IDs
-
- V-239416
- Rule IDs
-
- SV-239416r674971_rule
Checks: C-42649r674969_chk
At the command prompt, execute the following command: # find /usr/lib/vmware-perfcharts/tc-instance/webapps/ -type l -ls If the command produces any output, this is a finding.
Fix: F-42608r674970_fix
At the command prompt, execute the following commands: Note: Replace <file_name> for the name of any files that were returned. # unlink <file_name> Repeat the commands for each file that was returned.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- VCPF-67-000016
- Vuln IDs
-
- V-239417
- Rule IDs
-
- SV-239417r674974_rule
Checks: C-42650r674972_chk
At the command prompt, execute the following command: # find /usr/lib/vmware-perfcharts/tc-instance/webapps/ -xdev -type f -a '(' -not -user perfcharts -o -not -group cis ')' -exec ls -A {} \; Expected result: /usr/lib/vmware-perfcharts/tc-instance/webapps/statsreport/WEB-INF/web.xml If the command does not produce output, this is NOT a finding. If the output of the command does not match the expected result, this is a finding.
Fix: F-42609r674973_fix
At the command prompt, execute the following command: # chown perfcharts:cis <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VCPF-67-000017
- Vuln IDs
-
- V-239418
- Rule IDs
-
- SV-239418r674977_rule
Checks: C-42651r674975_chk
At the command line, execute the following command: # grep EXIT_ON_INIT_FAILURE /usr/lib/vmware-perfcharts/tc-instance/conf/catalina.properties Expected result: org.apache.catalina.startup.EXIT_ON_INIT_FAILURE = true If the output of the command does not match the expected result, this is a finding.
Fix: F-42610r674976_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/catalina.properties. Add or change the following line: org.apache.catalina.startup.EXIT_ON_INIT_FAILURE=true
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- VCPF-67-000018
- Vuln IDs
-
- V-239419
- Rule IDs
-
- SV-239419r674980_rule
Checks: C-42652r674978_chk
At the command prompt, execute the following command: # xmllint --xpath '/Server/Service/Connector/@acceptCount' /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml Expected result: acceptCount="300" If the output does not match the expected result, this is a finding.
Fix: F-42611r674979_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml. Configure the <Connector> node with the following value: acceptCount="300"
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCPF-67-000019
- Vuln IDs
-
- V-239420
- Rule IDs
-
- SV-239420r674983_rule
Checks: C-42653r674981_chk
At the command prompt, execute the following command: # xmllint --xpath '/Server/Service/Connector/@URIEncoding' /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml Expected result: URIEncoding="UTF-8" If the output does not match the expected result, this is a finding.
Fix: F-42612r674982_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml. Configure the <Connector> node with the value 'URIEncoding="UTF-8"'.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCPF-67-000020
- Vuln IDs
-
- V-239421
- Rule IDs
-
- SV-239421r816588_rule
Checks: C-42654r816586_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/filter-mapping/filter-name[text()="setCharacterEncodingFilter"]/parent::filter-mapping' - Expected result: <filter-mapping> <filter-name>setCharacterEncodingFilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> If the output is does not match the expected result, this is a finding. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/filter/filter-name[text()="setCharacterEncodingFilter"]/parent::filter' - Expected result: <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> </init-param> <init-param> <param-name>ignore</param-name> <param-value>true</param-value> </init-param> <async-supported>true</async-supported> </filter> If the output is does not match the expected result, this is a finding.
Fix: F-42613r816587_fix
Open /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml in a text editor. Configure the <web-app> node with the child nodes listed below: <filter-mapping> <filter-name>setCharacterEncodingFilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> </init-param> <init-param> <param-name>ignore</param-name> <param-value>true</param-value> </init-param> <async-supported>true</async-supported> </filter>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCPF-67-000021
- Vuln IDs
-
- V-239422
- Rule IDs
-
- SV-239422r674989_rule
Checks: C-42655r674987_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/welcome-file-list' - Expected result: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list> If the output of the command does not match the expected result, this is a finding.
Fix: F-42614r674988_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml. Add the following section under the <web-apps> node: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCPF-67-000022
- Vuln IDs
-
- V-239423
- Rule IDs
-
- SV-239423r674992_rule
Checks: C-42656r674990_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="listings"]/parent::init-param' - Expected result: <init-param> <param-name>listings</param-name> <param-value>false</param-value> </init-param> If the output of the command does not match the expected result, this is a finding.
Fix: F-42615r674991_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml. Set the <param-value> to "false" in all <param-name>listing</param-name> nodes. Note: The setting should look like the following: <init-param> <param-name>listings</param-name> <param-value>false</param-value> </init-param>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCPF-67-000023
- Vuln IDs
-
- V-239424
- Rule IDs
-
- SV-239424r816590_rule
Checks: C-42657r816589_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-perfcharts/tc-instance/webapps/statsreport/WEB-INF/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/error-page/exception-type["text()=java.lang.Throwable"]/parent::error-page' - Expected result: <error-page> <exception-type>java.lang.Throwable</exception-type> <location>/http_error.jsp</location> </error-page> If the output does not match the expected result, this is a finding.
Fix: F-42616r674994_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/webapps/statsreport/WEB-INF/web.xml. Add the following section under the <web-apps> node: <error-page> <exception-type>java.lang.Throwable</exception-type> <location>/error.jsp</location> </error-page>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCPF-67-000024
- Vuln IDs
-
- V-239425
- Rule IDs
-
- SV-239425r674998_rule
Checks: C-42658r674996_chk
At the command prompt, execute the following command: # grep allowTrace /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml If "allowTrace" is set to "true", this is a finding. If no line is returned, this is NOT a finding.
Fix: F-42617r674997_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/server.xml. Navigate to and locate: 'allowTrace="true"' Remove the 'allowTrace="true"' setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCPF-67-000025
- Vuln IDs
-
- V-239426
- Rule IDs
-
- SV-239426r675001_rule
Checks: C-42659r674999_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="debug"]/parent::init-param' - Expected result: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param> If the output of the command does not match the expected result, this is a finding. If no lines are returned, this is NOT a finding.
Fix: F-42618r675000_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/web.xml. Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the following: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param>
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- VCPF-67-000026
- Vuln IDs
-
- V-239427
- Rule IDs
-
- SV-239427r675004_rule
Checks: C-42660r675002_chk
At the command prompt, execute the following command: # grep -i "max" /etc/vmware-perfcharts/log4j.properties Expected result: log4j.appender.LOGFILE.MaxFileSize=5MB log4j.appender.LOGFILE.MaxBackupIndex=10 If the output of the command does not match the expected result, this is a finding.
Fix: F-42619r675003_fix
Open /etc/vmware-perfcharts/log4j.properties with a text editor and add or change the following settings: log4j.appender.LOGFILE.MaxFileSize=5MB log4j.appender.LOGFILE.MaxBackupIndex=10
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- VCPF-67-000027
- Vuln IDs
-
- V-239428
- Rule IDs
-
- SV-239428r675007_rule
Checks: C-42661r675005_chk
At the command prompt, execute the following command: # grep -v "^#" /etc/vmware-syslog/stig-services-perfcharts.conf Expected result: input(type="imfile" File="/var/log/vmware/perfcharts/localhost_access_log.*.txt" Tag="perfcharts-localhost_access" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/perfcharts/vmware-perfcharts-runtime.log.std*" Tag="perfcharts-runtime" Severity="info" Facility="local0") If the file does not exist, this is a finding. If the output of the command does not match the expected result, this is a finding.
Fix: F-42620r675006_fix
Navigate to and open /etc/vmware-syslog/stig-services-perfcharts.conf. Create the file if it does not exist. Set the contents of the file as follows: input(type="imfile" File="/var/log/vmware/perfcharts/localhost_access_log.*.txt" Tag="perfcharts-localhost_access" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/perfcharts/vmware-perfcharts-runtime.log.std*" Tag="perfcharts-runtime" Severity="info" Facility="local0")
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VCPF-67-000028
- Vuln IDs
-
- V-239429
- Rule IDs
-
- SV-239429r816592_rule
Checks: C-42662r675008_chk
At the command prompt, execute the following command: # grep '^bio\.' /usr/lib/vmware-perfcharts/tc-instance/conf/catalina.properties Expected result: bio.http.port=13080 bio.https.port=8443 If the output of the command does not match the expected result, this is a finding.
Fix: F-42621r816591_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/conf/catalina.properties. Navigate to the ports specification section. Add or modify the following lines: bio.http.port=13080 bio.https.port=8443
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VCPF-67-000029
- Vuln IDs
-
- V-239430
- Rule IDs
-
- SV-239430r675013_rule
Checks: C-42663r675011_chk
At the command prompt, execute the following command: # grep base.shutdown.port /usr/lib/vmware-perfcharts/tc-instance/conf/catalina.properties Expected result: base.shutdown.port=-1 If the output of the command does not match the expected result, this is a finding.
Fix: F-42622r675012_fix
Navigate to and open /etc/vmware-eam/catalina.properties. Navigate to the ports specification section. Add or modify the following line: base.shutdown.port=-1
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VCPF-67-000030
- Vuln IDs
-
- V-239431
- Rule IDs
-
- SV-239431r675016_rule
Checks: C-42664r675014_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-perfcharts/tc-instance/webapps/statsreport/WEB-INF/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/secure' - Expected result: <secure>true</secure> If the output of the command does not match the expected result, this is a finding.
Fix: F-42623r675015_fix
Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/webapps/statsreport/WEB-INF/web.xml. Navigate to the <session-config> node and configure it as follows: <session-config> <cookie-config> <http-only>true</http-only> <secure>true</secure> </cookie-config> <session-timeout>6</session-timeout> </session-config>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCPF-67-000031
- Vuln IDs
-
- V-239432
- Rule IDs
-
- SV-239432r675019_rule
Checks: C-42665r675017_chk
At the command prompt, execute the following command: # grep -A 6 "package.access" /usr/lib/vmware-perfcharts/tc-instance/conf/catalina.properties Expected result: package.access = \ sun.,\ org.apache.catalina.,\ org.apache.coyote.,\ org.apache.jasper.,\ org.apache.naming.resources.,\ org.apache.tomcat. If the output of the command does not match the expected result, this is a finding.
Fix: F-42624r675018_fix
Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties and ensure that the "package.access" line is configured as follows: package.access = \ sun.,\ org.apache.catalina.,\ org.apache.coyote.,\ org.apache.jasper.,\ org.apache.naming.resources.,\ org.apache.tomcat.