VMware vSphere 6.7 STS Tomcat Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 30
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 30
- V-239652 Medium checkfix The Security Token Service must limit the amount of time that each TCP connection is kept alive.
- V-239653 Medium checkfix The Security Token Service must limit the number of concurrent connections permitted.
- V-239654 Medium checkfix The Security Token Service must limit the maximum size of a POST request.
- V-239655 Medium checkfix The Security Token Service must protect cookies from XSS.
- V-239656 Medium checkfix The Security Token Service must record user access in a format that enables monitoring of remote access.
- V-239657 Medium checkfix The Security Token Service must generate log records during Java startup and shutdown.
- V-239658 Medium checkfix Security Token Service log files must only be modifiable by privileged users.
- V-239659 Medium checkfix The Security Token Service application files must be verified for their integrity.
- V-239660 Medium checkfix The Security Token Service must only run one web app.
- V-239661 Medium checkfix The Security Token Service must not be configured with unused realms.
- V-239662 Medium checkfix The Security Token Service must be configured to limit access to internal packages.
- V-239663 Medium checkfix The Security Token Service must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
- V-239664 Medium checkfix The Security Token Service must have mappings set for Java servlet pages.
- V-239665 Medium checkfix The Security Token Service must not have the Web Distributed Authoring (WebDAV) servlet installed.
- V-239666 Medium checkfix The Security Token Service must be configured with memory leak protection.
- V-239667 Medium checkfix The Security Token Service must not have any symbolic links in the web content directory tree.
- V-239668 Medium checkfix The Security Token Service directory tree must have permissions in an "out-of-the-box" state.
- V-239669 Medium checkfix The Security Token Service must fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
- V-239670 Medium checkfix The Security Token Service must limit the number of allowed connections.
- V-239671 Medium checkfix The Security Token Service must set "URIEncoding" to UTF-8.
- V-239672 Medium checkfix The Security Token Service must use the "setCharacterEncodingFilter" filter.
- V-239673 Medium checkfix The Security Token Service must set the welcome-file node to a default web page.
- V-239674 Medium checkfix The Security Token Service must not show directory listings.
- V-239675 Medium checkfix The Security Token Service must be configured to show error pages with minimal information.
- V-239676 Medium checkfix The Security Token Service must not enable support for TRACE requests.
- V-239677 Medium checkfix The Security Token Service must have the debug option disabled.
- V-239678 Medium checkfix Rsyslog must be configured to monitor and ship Security Token Service log files.
- V-239679 Medium checkfix The Security Token Service must be configured with the appropriate ports.
- V-239680 Medium checkfix The Security Token Service must disable the shutdown port.
- V-239681 Medium checkfix The Security Token Service must set the secure flag for cookies.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCST-67-000001
- Vuln IDs
-
- V-239652
- Rule IDs
-
- SV-239652r816681_rule
Checks: C-42885r816679_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Connector[@port="${bio-custom.http.port}"]/@connectionTimeout' - Expected result: connectionTimeout="60000" If the output does not match the expected result, this is a finding.
Fix: F-42844r816680_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value: connectionTimeout="60000"
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCST-67-000002
- Vuln IDs
-
- V-239653
- Rule IDs
-
- SV-239653r816684_rule
Checks: C-42886r816682_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Executor[@name="tomcatThreadPool"]/@maxThreads' - Expected result: maxThreads="300" If the output does not match the expected result, this is a finding.
Fix: F-42845r816683_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml. Navigate to the <Executor> mode with the name of "tomcatThreadPool" and configure with the value: 'maxThreads="300"' Note: The <Executor> node should be configured as follows: <Executor maxThreads="300" minSpareThreads="50" name="tomcatThreadPool" namePrefix="tomcat-http--" />
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCST-67-000003
- Vuln IDs
-
- V-239654
- Rule IDs
-
- SV-239654r816687_rule
Checks: C-42887r816685_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Connector[@port="${bio-custom.http.port}"]/@maxPostSize' - Expected result: XPath set is empty If the output does not match the expected result, this is a finding.
Fix: F-42846r816686_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml. Navigate to each of the <Connector> nodes. Remove any configuration for "maxPostSize".
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCST-67-000004
- Vuln IDs
-
- V-239655
- Rule IDs
-
- SV-239655r816690_rule
Checks: C-42888r816688_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/http-only' - Expected result: <http-only>true</http-only> If the output does not match the expected result, this is a finding.
Fix: F-42847r816689_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml. Navigate to the <session-config> node and configure it as follows: <session-config> <session-timeout>30</session-timeout> <cookie-config> <http-only>true</http-only> <secure>true</secure> </cookie-config> </session-config>
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VCST-67-000005
- Vuln IDs
-
- V-239656
- Rule IDs
-
- SV-239656r816693_rule
Checks: C-42889r816691_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Engine/Host/Valve[@className="org.apache.catalina.valves.AccessLogValve"]'/@pattern - Expected result: pattern="%h %{X-Forwarded-For}i %l %u %t &quot;%r&quot; %s %b &quot;%{User-Agent}i&quot;" If the output does not match the expected result, this is a finding.
Fix: F-42848r816692_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml. Inside the <Host> node, add the "AccessLogValve" <Valve> node entirely if it does not exist or update the existing pattern to match the following line: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %{X-Forwarded-For}i %l %u %t "%r" %s %b "%{User-Agent}i"" resolveHosts="false" prefix="localhost_access_log" suffix=".txt" />
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VCST-67-000006
- Vuln IDs
-
- V-239657
- Rule IDs
-
- SV-239657r816696_rule
Checks: C-42890r816694_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # grep "1catalina.org.apache.juli.FileHandler" /usr/lib/vmware-sso/vmware-sts/conf/logging.properties Expected result: handlers = 1catalina.org.apache.juli.FileHandler, 2localhost.org.apache.juli.FileHandler, 3manager.org.apache.juli.FileHandler, 4host-manager.org.apache.juli.FileHandler, java.util.logging.ConsoleHandler .handlers = 1catalina.org.apache.juli.FileHandler 1catalina.org.apache.juli.FileHandler.level = FINE 1catalina.org.apache.juli.FileHandler.directory = ${catalina.base}/logs 1catalina.org.apache.juli.FileHandler.prefix = catalina. 1catalina.org.apache.juli.FileHandler.bufferSize = -1 If the output does not match the expected result, this is a finding.
Fix: F-42849r816695_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/logging.properties. Ensure that the "handlers" and ".handlers" lines are configured as follows: handlers = 1catalina.org.apache.juli.FileHandler, 2localhost.org.apache.juli.FileHandler, 3manager.org.apache.juli.FileHandler, 4host-manager.org.apache.juli.FileHandler, java.util.logging.ConsoleHandler .handlers = 1catalina.org.apache.juli.FileHandler Ensure that the following lines are present: 1catalina.org.apache.juli.FileHandler.level = FINE 1catalina.org.apache.juli.FileHandler.directory = ${catalina.base}/logs 1catalina.org.apache.juli.FileHandler.prefix = catalina. 1catalina.org.apache.juli.FileHandler.bufferSize = -1
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VCST-67-000007
- Vuln IDs
-
- V-239658
- Rule IDs
-
- SV-239658r816699_rule
Checks: C-42891r816697_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # find /storage/log/vmware/sso/ -xdev -type f -a '(' -perm -o+w -o -not -user root -o -not -group root ')' -exec ls -ld {} \; If any files are returned, this is a finding.
Fix: F-42850r816698_fix
Connect to the PSC, whether external or embedded. At the command prompt, execute the following commands: # chmod o-w <file> # chown root:root <file> Note: Substitute <file> with the listed file.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCST-67-000008
- Vuln IDs
-
- V-239659
- Rule IDs
-
- SV-239659r816702_rule
Checks: C-42892r816700_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # rpm -V vmware-identity-sts|grep "^..5......"|grep -E "\.war|\.jar|\.sh|\.py" If there is any output, this is a finding.
Fix: F-42851r816701_fix
Connect to the PSC, whether external or embedded. Reinstall the VCSA or roll back to a snapshot. Modifying the Security Token Service installation files manually is not supported by VMware.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCST-67-000009
- Vuln IDs
-
- V-239660
- Rule IDs
-
- SV-239660r816705_rule
Checks: C-42893r816703_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # ls /usr/lib/vmware-sso/vmware-sts/webapps/*.war Expected result: /usr/lib/vmware-sso/vmware-sts/webapps/ROOT.war If the result of this command does not match the expected result, this is a finding.
Fix: F-42852r816704_fix
Connect to the PSC, whether external or embedded. For each unexpected file returned in the check, run the following command: # rm /usr/lib/vmware-sso/vmware-sts/webapps/<NAME>.war Restart the service with the following command: # service-control --restart vmware-stsd
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCST-67-000010
- Vuln IDs
-
- V-239661
- Rule IDs
-
- SV-239661r816708_rule
Checks: C-42894r816706_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # grep UserDatabase /usr/lib/vmware-sso/vmware-sts/conf/server.xml If the command produces any output, this is a finding.
Fix: F-42853r816707_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml. Remove the <Realm> nodes returned in the check.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCST-67-000011
- Vuln IDs
-
- V-239662
- Rule IDs
-
- SV-239662r816711_rule
Checks: C-42895r816709_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # grep "package.access" /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties Expected result: package.access=sun.,org.apache.catalina.,org.apache.coyote.,org.apache.tomcat.,org.apache.jasper. If the output of the command does not match the expected result, this is a finding.
Fix: F-42854r816710_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties. Ensure that the "package.access" line is configured as follows: package.access=sun.,org.apache.catalina.,org.apache.coyote.,org.apache.tomcat.,org.apache.jasper.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCST-67-000012
- Vuln IDs
-
- V-239663
- Rule IDs
-
- SV-239663r816714_rule
Checks: C-42896r816712_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # grep -En '(x-csh<)|(x-sh<)|(x-shar<)|(x-ksh<)' /usr/lib/vmware-sso/vmware-sts/conf/web.xml If the command produces any output, this is a finding.
Fix: F-42855r816713_fix
Connect to the PSC, whether external or embedded. Open /usr/lib/vmware-sso/vmware-sts/conf/web.xml in a text editor. Remove the parent <mime-mapping> node of any line returned from the check. Example: <mime-mapping> <extension>csh</extension> <mime-type>application/x-csh</mime-type> </mime-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCST-67-000013
- Vuln IDs
-
- V-239664
- Rule IDs
-
- SV-239664r816717_rule
Checks: C-42897r816715_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/servlet-mapping/servlet-name[text()="jsp"]/parent::servlet-mapping' - Expected result: <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping> If the output of the command does not match the expected result, this is a finding.
Fix: F-42856r816716_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml. Inside the <web-app> parent node, add the following: <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCST-67-000014
- Vuln IDs
-
- V-239665
- Rule IDs
-
- SV-239665r816720_rule
Checks: C-42898r816718_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # grep -n 'webdav' /usr/lib/vmware-sso/vmware-sts/conf/web.xml If the command produces any output, this is a finding.
Fix: F-42857r816719_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml. Find the <servlet-name>webdav</servlet-name> node and remove the entire parent <servlet> block. Find the <servlet-name>webdav</servlet-name> node and remove the entire parent <servlet-mapping> block.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCST-67-000015
- Vuln IDs
-
- V-239666
- Rule IDs
-
- SV-239666r816723_rule
Checks: C-42899r816721_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # grep JreMemoryLeakPreventionListener /usr/lib/vmware-sso/vmware-sts/conf/server.xml Expected result: <Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/> If the output of the command does not match the expected result, this is a finding.
Fix: F-42858r816722_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml. Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCST-67-000016
- Vuln IDs
-
- V-239667
- Rule IDs
-
- SV-239667r816726_rule
Checks: C-42900r816724_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # find /usr/lib/vmware-sso/vmware-sts/webapps/ -type l -ls If the command produces any output, this is a finding.
Fix: F-42859r816725_fix
Connect to the PSC, whether external or embedded. At the command prompt, execute the following commands: Note: Replace <file_name> for the name of any files that were returned. # unlink <file_name> Repeat the commands for each file that was returned.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- VCST-67-000017
- Vuln IDs
-
- V-239668
- Rule IDs
-
- SV-239668r816729_rule
Checks: C-42901r816727_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # find /usr/lib/vmware-sso/vmware-sts/ -xdev -type f -a '(' -not -user root -o -not -group root ')' -exec ls -ld {} \; If the command produces any output, this is a finding.
Fix: F-42860r816728_fix
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # chown root:root <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VCST-67-000018
- Vuln IDs
-
- V-239669
- Rule IDs
-
- SV-239669r816732_rule
Checks: C-42902r816730_chk
Connect to the PSC, whether external or embedded. At the command line, execute the following command: # grep EXIT_ON_INIT_FAILURE /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties Expected result: org.apache.catalina.startup.EXIT_ON_INIT_FAILURE=true If the output of the command does not match the expected result, this is a finding.
Fix: F-42861r816731_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties. Add or change the following line: org.apache.catalina.startup.EXIT_ON_INIT_FAILURE=true
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- VCST-67-000019
- Vuln IDs
-
- V-239670
- Rule IDs
-
- SV-239670r816735_rule
Checks: C-42903r816733_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Connector[@port="${bio-custom.http.port}"]/@acceptCount' - Expected result: acceptCount="100" If the output does not match the expected result, this is a finding.
Fix: F-42862r816734_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml. Navigate to the <Connector> configured with port="${bio-custom.http.port}". Add or change the following value: acceptCount="100"
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCST-67-000020
- Vuln IDs
-
- V-239671
- Rule IDs
-
- SV-239671r816738_rule
Checks: C-42904r816736_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Connector[@port="${bio-custom.http.port}"]/@URIEncoding' - Expected result: URIEncoding="UTF-8" If the output does not match the expected result, this is a finding.
Fix: F-42863r816737_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'URIEncoding="UTF-8"'.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCST-67-000021
- Vuln IDs
-
- V-239672
- Rule IDs
-
- SV-239672r816741_rule
Checks: C-42905r816739_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/filter-mapping/filter-name[text()="setCharacterEncodingFilter"]/parent::filter-mapping' - Expected result: <filter-mapping> <filter-name>setCharacterEncodingFilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> If the output is does not match the expected result, this is a finding. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/filter/filter-name[text()="setCharacterEncodingFilter"]/parent::filter' - Expected result: <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> </init-param> <init-param> <param-name>ignore</param-name> <param-value>true</param-value> </init-param> <async-supported>true</async-supported> </filter> If the output is does not match the expected result, this is a finding.
Fix: F-42864r816740_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml. Configure the <web-app> node with the child nodes listed below: <filter-mapping> <filter-name>setCharacterEncodingFilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> </init-param> <init-param> <param-name>ignore</param-name> <param-value>true</param-value> </init-param> <async-supported>true</async-supported> </filter>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCST-67-000022
- Vuln IDs
-
- V-239673
- Rule IDs
-
- SV-239673r816744_rule
Checks: C-42906r816742_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/welcome-file-list' - Expected result: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list> If the output of the command does not match the expected result, this is a finding.
Fix: F-42865r816743_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml. Add the following section under the <web-apps> node: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCST-67-000023
- Vuln IDs
-
- V-239674
- Rule IDs
-
- SV-239674r816747_rule
Checks: C-42907r816745_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="listings"]/parent::init-param' - Expected result: <init-param> <param-name>listings</param-name> <param-value>false</param-value> </init-param> If the output of the command does not match the expected result, this is a finding.
Fix: F-42866r816746_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml. Set the <param-value> to "false" in all <param-name>listing</param-name> nodes. Note: The setting should look like the following: <init-param> <param-name>listings</param-name> <param-value>false</param-value> </init-param>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCST-67-000024
- Vuln IDs
-
- V-239675
- Rule IDs
-
- SV-239675r816750_rule
Checks: C-42908r816748_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Engine/Host/Valve[@className="org.apache.catalina.valves.ErrorReportValve"]' - Expected result: <Valve className="org.apache.catalina.valves.ErrorReportValve" showReport="false" showServerInfo="false"/> If the output does not match the expected result, this is a finding.
Fix: F-42867r816749_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml. Locate the following Host block: <Host appBase="webapps" ...> ... </Host> Inside this block, add the following on a new line: <Valve className="org.apache.catalina.valves.ErrorReportValve" showReport="false" showServerInfo="false" />
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCST-67-000025
- Vuln IDs
-
- V-239676
- Rule IDs
-
- SV-239676r816753_rule
Checks: C-42909r816751_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # grep allowTrace /usr/lib/vmware-sso/vmware-sts/conf/server.xml If "allowTrace" is set to "true", this is a finding. If no line is returned, this is NOT a finding.
Fix: F-42868r816752_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml. Navigate to and locate: 'allowTrace="true"' Remove the 'allowTrace="true"' setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCST-67-000026
- Vuln IDs
-
- V-239677
- Rule IDs
-
- SV-239677r816756_rule
Checks: C-42910r816754_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="debug"]/parent::init-param' - Expected result: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param> If the output of the command does not match the expected result, this is a finding. If no lines are returned, this is not a finding.
Fix: F-42869r816755_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml. Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the following: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param>
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- VCST-67-000027
- Vuln IDs
-
- V-239678
- Rule IDs
-
- SV-239678r816759_rule
Checks: C-42911r816757_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # grep -v "^#" /etc/vmware-syslog/stig-services-sso.conf Expected result: input(type="imfile" File="/var/log/vmware/sso/*.log" Tag="vmidentity" PersistStateInterval="200" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/sso/sts-runtime.log.*" Tag="sts-runtime" PersistStateInterval="200" Severity="info" Facility="local0") If the file does not exist, this is a finding. If the output of the command does not match the expected result, this is a finding.
Fix: F-42870r816758_fix
Connect to the PSC, whether external or embedded. Navigate to and open /etc/vmware-syslog/stig-services-sso.conf. Create the file if it does not exist. Set the contents of the file as follows: input(type="imfile" File="/var/log/vmware/sso/*.log" Tag="vmidentity" PersistStateInterval="200" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/sso/sts-runtime.log.*" Tag="sts-runtime" PersistStateInterval="200" Severity="info" Facility="local0")
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VCST-67-000028
- Vuln IDs
-
- V-239679
- Rule IDs
-
- SV-239679r816762_rule
Checks: C-42912r816760_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # grep 'bio' /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties Expected result: bio-custom.http.port=7080 bio-custom.https.port=8443 bio-ssl-localhost.https.port=7444 If the output of the command does not match the expected result, this is a finding.
Fix: F-42871r816761_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties. Navigate to the ports specification section. Set the Security Token Service port specifications according to the following list: bio-custom.http.port=7080 bio-custom.https.port=8443 bio-ssl-localhost.https.port=7444
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VCST-67-000029
- Vuln IDs
-
- V-239680
- Rule IDs
-
- SV-239680r816765_rule
Checks: C-42913r816763_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # grep 'base.shutdown.port' /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties Expected result: base.shutdown.port=-1 If the output of the command does not match the expected result, this is a finding.
Fix: F-42872r816764_fix
Connect to the PSC, whether external or embedded. Open /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties in a text editor. Add or modify the following setting: base.shutdown.port=-1
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VCST-67-000030
- Vuln IDs
-
- V-239681
- Rule IDs
-
- SV-239681r816768_rule
Checks: C-42914r816766_chk
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/secure' - Expected result: <secure>true</secure> If the output of the command does not match the expected result, this is a finding.
Fix: F-42873r816767_fix
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml. Navigate to the /<web-apps>/<session-config>/<cookie-config> node and configure it as follows: <cookie-config> <http-only>true</http-only> <secure>true</secure> </cookie-config>