VMware vSphere 6.7 UI Tomcat Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 3
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 3
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCUI-67-000001
- Vuln IDs
-
- V-239682
- Rule IDs
-
- SV-239682r816771_rule
Checks: C-42915r816769_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Connector[@port="${http.port}"]/@connectionTimeout' - Expected result: connectionTimeout="300000" If the output does not match the expected result, this is a finding.
Fix: F-42874r816770_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Configure the http <Connector> node with the value: 'connectionTimeout="300000"' Example: <Connector .. connectionTimeout="300000" ..>
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCUI-67-000002
- Vuln IDs
-
- V-239683
- Rule IDs
-
- SV-239683r679155_rule
Checks: C-42916r679153_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Connector[@port="${http.port}"]/@maxThreads' - Expected result: maxThreads="800" If the output does not match the expected result, this is a finding.
Fix: F-42875r679154_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Configure each <Connector> node with the value: 'maxThreads="800"' Example: <Connector .. maxThreads="800" ..>
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCUI-67-000003
- Vuln IDs
-
- V-239684
- Rule IDs
-
- SV-239684r679158_rule
Checks: C-42917r679156_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Connector[@port="${http.port}"]/@maxPostSize' - Expected result: XPath set is empty If the output does not match the expected result, this is a finding.
Fix: F-42876r679157_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Navigate to each of the <Connector> nodes. Remove any configuration for "maxPostSize".
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCUI-67-000004
- Vuln IDs
-
- V-239685
- Rule IDs
-
- SV-239685r679161_rule
Checks: C-42918r679159_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/context.xml | xmllint --xpath '/Context/@useHttpOnly' - Expected result: useHttpOnly="true" If the output does not match the expected result, this is a finding.
Fix: F-42877r679160_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/context.xml. Add the following configuration to the <Context> node: useHttpOnly="true" Example: <Context useHttpOnly="true" sessionCookieName="VSPHERE-UI-JSESSIONID" sessionCookiePath="/ui">
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VCUI-67-000005
- Vuln IDs
-
- V-239686
- Rule IDs
-
- SV-239686r816774_rule
Checks: C-42919r816772_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/server.xml | xmllint --xpath '/Server/Service/Engine/Host/Valve[@className="org.apache.catalina.valves.AccessLogValve"]'/@pattern - Expected result: pattern="%h %{x-forwarded-for}i %l %u %t %r %s %b %{#hashedSessionId#}s %I %D" If the output does not match the expected result, this is a finding.
Fix: F-42878r816773_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Ensure the log pattern in the "org.apache.catalina.valves.AccessLogValve" node is set to the following: pattern="pattern="%h %{x-forwarded-for}i %l %u %t %r %s %b %{#hashedSessionId#}s %I %D""
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VCUI-67-000006
- Vuln IDs
-
- V-239687
- Rule IDs
-
- SV-239687r679167_rule
Checks: C-42920r679165_chk
At the command prompt, execute the following command: # grep StreamRedirectFile /etc/vmware/vmware-vmon/svcCfgfiles/vsphere-ui.json Expected result: "StreamRedirectFile": "%VMWARE_LOG_DIR%/vmware/vsphere-ui/logs/vsphere-ui-runtime.log", If no log file is specified for the "StreamRedirectFile" setting, this is a finding.
Fix: F-42879r679166_fix
Navigate to and open /etc/vmware/vmware-vmon/svcCfgfiles/vsphere-ui.json. Below the last line of the "PreStartCommandArg" block, add or reconfigure the following line: "StreamRedirectFile": "%VMWARE_LOG_DIR%/vmware/vsphere-ui/logs/vsphere-ui-runtime.log", Restart the appliance for changes to take effect.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VCUI-67-000007
- Vuln IDs
-
- V-239688
- Rule IDs
-
- SV-239688r679170_rule
Checks: C-42921r679168_chk
At the command prompt, execute the following command: # find /storage/log/vmware/vsphere-ui/logs/ -xdev -type f -a '(' -not -perm 600 -o -not -user vsphere-ui ')' -exec ls -ld {} \; If any files are returned, this is a finding.
Fix: F-42880r679169_fix
At the command prompt, execute the following commands: # chmod 600 /storage/log/vmware/vsphere-ui/logs/<file> # chown vsphere-ui:users /storage/log/vmware/vsphere-ui/logs/<file> Note: Substitute <file> with the listed file.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCUI-67-000008
- Vuln IDs
-
- V-239689
- Rule IDs
-
- SV-239689r679173_rule
Checks: C-42922r679171_chk
At the command prompt, execute the following command: # rpm -V vsphere-ui|grep "^..5......"|grep -E "\.war|\.jar|\.sh|\.py" If is any output, this is a finding.
Fix: F-42881r679172_fix
Reinstall the VCSA or roll back to a snapshot. Modifying the vSphere UI installation files manually is not supported by VMware.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCUI-67-000009
- Vuln IDs
-
- V-239690
- Rule IDs
-
- SV-239690r679176_rule
Checks: C-42923r679174_chk
At the command prompt, execute the following command: # diff <(find /usr/lib/vmware-vsphere-ui/plugin-packages/vsphere-client/plugins -type f|sort) <(rpm -ql vsphere-ui|grep "/usr/lib/vmware-vsphere-ui/plugin-packages/vsphere-client/plugins/"|sort) If there is any output, this indicates a vSphere UI plugin is present that does not ship with the VCSA. If this plugin is not known and approved, this is a finding.
Fix: F-42882r679175_fix
For every unauthorized plugin returned by the check, run the following command. # rm <file>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCUI-67-000010
- Vuln IDs
-
- V-239691
- Rule IDs
-
- SV-239691r679179_rule
Checks: C-42924r679177_chk
At the command prompt, execute the following command: # grep "package.access" /usr/lib/vmware-vsphere-ui/server/conf/catalina.properties Expected result: package.access=sun.,org.apache.catalina.,org.apache.coyote.,org.apache.jasper.,org.apache.tomcat. If the output of the command does not match the expected result, this is a finding.
Fix: F-42883r679178_fix
Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/catalina.properties. Ensure that the "package.access" line is configured as follows: package.access=sun.,org.apache.catalina.,org.apache.coyote.,org.apache.jasper.,org.apache.tomcat.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCUI-67-000011
- Vuln IDs
-
- V-239692
- Rule IDs
-
- SV-239692r679182_rule
Checks: C-42925r679180_chk
At the command prompt, execute the following command: # grep -En '(x-csh<)|(x-sh<)|(x-shar<)|(x-ksh<)' /usr/lib/vmware-vsphere-ui/server/conf/web.xml If the command produces any output, this is a finding.
Fix: F-42884r679181_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/web.xml. Remove any and all of the following nodes lines: <mime-type>application/x-csh</mime-type> <mime-type>application/x-shar</mime-type> <mime-type>application/x-sh</mime-type> <mime-type>application/x-ksh</mime-type>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCUI-67-000012
- Vuln IDs
-
- V-239693
- Rule IDs
-
- SV-239693r679185_rule
Checks: C-42926r679183_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/servlet-mapping/servlet-name[text()="jsp"]/parent::servlet-mapping' - Expected result: <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping> If the jsp and jspx file url-patterns are not configured as in the expected result, this is a finding.
Fix: F-42885r679184_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/web.xml. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>. Configure the <servlet-mapping> node to look like the code snippet below: <!-- The mappings for the JSP servlet --> <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCUI-67-000013
- Vuln IDs
-
- V-239694
- Rule IDs
-
- SV-239694r679188_rule
Checks: C-42927r679186_chk
At the command prompt, execute the following command: # grep -n 'webdav' /usr/lib/vmware-vsphere-ui/server/conf/web.xml If the command produces any output, this is a finding.
Fix: F-42886r679187_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/web.xml. Find the <servlet-name>webdav</servlet-name> node and remove the entire parent <servlet> block. Find the <servlet-name>webdav</servlet-name> node and remove the entire parent <servlet-mapping> block.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCUI-67-000014
- Vuln IDs
-
- V-239695
- Rule IDs
-
- SV-239695r679191_rule
Checks: C-42928r679189_chk
At the command prompt, execute the following command: # grep JreMemoryLeakPreventionListener /usr/lib/vmware-vsphere-ui/server/conf/server.xml Expected result: <Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/> If the output of the command does not match the expected result, this is a finding.
Fix: F-42887r679190_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCUI-67-000015
- Vuln IDs
-
- V-239696
- Rule IDs
-
- SV-239696r679194_rule
Checks: C-42929r679192_chk
At the command prompt, execute the following command: # find /usr/lib/vmware-vsphere-ui/server/static/ -type l -ls If the command produces any output, this is a finding.
Fix: F-42888r679193_fix
At the command prompt, execute the following commands: Note: Replace <file_name> for the name of any files that were returned. unlink <file_name> Repeat the commands for each file that was returned.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- VCUI-67-000016
- Vuln IDs
-
- V-239697
- Rule IDs
-
- SV-239697r679197_rule
Checks: C-42930r679195_chk
At the command prompt, execute the following command: # find /usr/lib/vmware-vsphere-ui/server/lib /usr/lib/vmware-vsphere-ui/server/conf -xdev -type f -a '(' -perm -o+w -o -not -user vsphere-ui -o -not -group root ')' -exec ls -ld {} \; If the command produces any output, this is a finding.
Fix: F-42889r679196_fix
At the command prompt, execute the following command: # chmod o-w <file> # chown vsphere-ui:root <file> Repeat the command for each file that was returned.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VCUI-67-000017
- Vuln IDs
-
- V-239698
- Rule IDs
-
- SV-239698r679200_rule
Checks: C-42931r679198_chk
At the command line, execute the following command: # grep EXIT_ON_INIT_FAILURE /usr/lib/vmware-vsphere-ui/server/conf/catalina.properties Expected result: org.apache.catalina.startup.EXIT_ON_INIT_FAILURE=true If the output of the command does not match the expected result, this is a finding.
Fix: F-42890r679199_fix
Navigate to and open /etc/vmware-eam/catalina.properties. Add or change the following line: org.apache.catalina.startup.EXIT_ON_INIT_FAILURE=true
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- VCUI-67-000018
- Vuln IDs
-
- V-239699
- Rule IDs
-
- SV-239699r679203_rule
Checks: C-42932r679201_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Connector[@port="${http.port}"]/@acceptCount' - Expected result: acceptCount="300" If the output does not match the expected result, this is a finding.
Fix: F-42891r679202_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Navigate to the <Connector> configured with port="${http.port}". Add or change the following value: acceptCount="300"
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCUI-67-000019
- Vuln IDs
-
- V-239700
- Rule IDs
-
- SV-239700r679206_rule
Checks: C-42933r679204_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Connector[@port="${http.port}"]/@URIEncoding' - Expected result: URIEncoding="UTF-8" If the output does not match the expected result, this is a finding.
Fix: F-42892r679205_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'URIEncoding="UTF-8"'.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCUI-67-000020
- Vuln IDs
-
- V-239701
- Rule IDs
-
- SV-239701r679209_rule
Checks: C-42934r679207_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/welcome-file-list' - Expected result: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list> If the output of the command does not match the expected result, this is a finding.
Fix: F-42893r679208_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/web.xml. Add the following section under the <web-apps> node: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCUI-67-000021
- Vuln IDs
-
- V-239702
- Rule IDs
-
- SV-239702r679212_rule
Checks: C-42935r679210_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="listings"]/parent::init-param' - Expected result: <init-param> <param-name>listings</param-name> <param-value>false</param-value> </init-param> If the output of the command does not match the expected result, this is a finding.
Fix: F-42894r679211_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/web.xml. Set the <param-value> to "false" in all <param-name>listing</param-name> nodes. Note: The setting should look like the following: <init-param> <param-name>listings</param-name> <param-value>false</param-value> </init-param>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCUI-67-000022
- Vuln IDs
-
- V-239703
- Rule IDs
-
- SV-239703r679215_rule
Checks: C-42936r679213_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Connector[@port="${http.port}"]/@server' - Expected result: server="Anonymous" If the output does not match the expected result, this is a finding.
Fix: F-42895r679214_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with 'server="Anonymous"'.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCUI-67-000023
- Vuln IDs
-
- V-239704
- Rule IDs
-
- SV-239704r679218_rule
Checks: C-42937r679216_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/server.xml | xmllint --xpath '/Server/Service/Engine/Host/Valve[@className="org.apache.catalina.valves.ErrorReportValve"]' - Expected result: <Valve className="org.apache.catalina.valves.ErrorReportValve" showServerInfo="false"/> If the output of the command does not match the expected result, this is a finding.
Fix: F-42896r679217_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Locate the following Host block: <Host name="localhost"" ...> ... </Host> Inside this block, add the following on a new line: <Valve className="org.apache.catalina.valves.ErrorReportValve" showServerInfo="false"/>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCUI-67-000024
- Vuln IDs
-
- V-239705
- Rule IDs
-
- SV-239705r679221_rule
Checks: C-42938r679219_chk
At the command prompt, execute the following command: # grep allowTrace /usr/lib/vmware-vsphere-ui/server/conf/server.xml If "allowTrace" is set to "true", this is a finding. If no line is returned, this is NOT a finding.
Fix: F-42897r679220_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Navigate to and locate: 'allowTrace="true"' Remove the 'allowTrace="true"' setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCUI-67-000025
- Vuln IDs
-
- V-239706
- Rule IDs
-
- SV-239706r816777_rule
Checks: C-42939r816775_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="debug"]/parent::init-param' - Expected result: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param> If no lines are returned, this is not a finding. If the output of the command does not match the expected result, this is a finding.
Fix: F-42898r816776_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/web.xml. Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the following: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param>
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- VCUI-67-000026
- Vuln IDs
-
- V-239707
- Rule IDs
-
- SV-239707r679227_rule
Checks: C-42940r679225_chk
At the command prompt, execute the following command: # rpm -V vsphere-ui|grep serviceability.xml|grep "^..5......" If the above command returns any output, this is a finding.
Fix: F-42899r679226_fix
Reinstall the VCSA or roll back to a snapshot. Modifying the vSphere UI installation files manually is not supported by VMware.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- VCUI-67-000027
- Vuln IDs
-
- V-239708
- Rule IDs
-
- SV-239708r679230_rule
Checks: C-42941r679228_chk
At the command prompt, execute the following command: # grep -v "^#" /etc/vmware-syslog/stig-services-vsphere-ui.conf Expected result: input(type="imfile" File="/var/log/vmware/vsphere-ui/logs/access/localhost_access*" Tag="ui-access" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/vsphere-ui/logs/vsphere-ui-runtime*" Tag="ui-runtime" Severity="info" Facility="local0") If the file does not exist, this is a finding. If the output of the command does not match the expected result, this is a finding.
Fix: F-42900r679229_fix
Navigate to and open /etc/vmware-syslog/stig-services-vsphere-ui.conf. Create the file if it does not exist. Set the contents of the file as follows: input(type="imfile" File="/var/log/vmware/vsphere-ui/logs/access/localhost_access*" Tag="ui-access" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/vsphere-ui/logs/vsphere-ui-runtime*" Tag="ui-runtime" Severity="info" Facility="local0")
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VCUI-67-000028
- Vuln IDs
-
- V-239709
- Rule IDs
-
- SV-239709r679233_rule
Checks: C-42942r679231_chk
At the command prompt, execute the following command: # grep '.port' /usr/lib/vmware-vsphere-ui/server/conf/catalina.properties Expected result: http.port=5090 proxy.port=443 https.port=5443 If the output of the command does not match the expected result, this is a finding.
Fix: F-42901r679232_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/catalina.properties. Navigate to the ports specification section. Set the vSphere UI port specifications according to the shipping configuration below: http.port=5090 proxy.port=443 https.port=5443
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VCUI-67-000029
- Vuln IDs
-
- V-239710
- Rule IDs
-
- SV-239710r679236_rule
Checks: C-42943r679234_chk
At the command prompt, execute the following commands: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/@port' - Expected result: port="${shutdown.port}" If the output does not match the expected result, this is a finding. # grep shutdown /etc/vmware/vmware-vmon/svcCfgfiles/vsphere-ui.json Expected result: "-Dshutdown.port=-1", If the output does not match the expected result, this is a finding.
Fix: F-42902r679235_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Make sure that the server port is disabled: <Server port="${shutdown.port}" …>
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VCUI-67-000030
- Vuln IDs
-
- V-239711
- Rule IDs
-
- SV-239711r679239_rule
Checks: C-42944r679237_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/secure' - Expected result: <secure>true</secure> If the output of the command does not match the expected result, this is a finding.
Fix: F-42903r679238_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/web.xml. Navigate to the /<web-apps>/<session-config>/<cookie-config> node and configure it as follows: <cookie-config> <http-only>true</http-only> <secure>true</secure> </cookie-config>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCUI-67-000031
- Vuln IDs
-
- V-239712
- Rule IDs
-
- SV-239712r679242_rule
Checks: C-42945r679240_chk
At the command prompt, execute the following command: # grep UserDatabaseRealm /usr/lib/vmware-vsphere-ui/server/conf/server.xml If the command produces any output, this is a finding.
Fix: F-42904r679241_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/server.xml. Remove any and all <Realm> nodes.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- VCUI-67-000032
- Vuln IDs
-
- V-239713
- Rule IDs
-
- SV-239713r679245_rule
Checks: C-42946r679243_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-ui/server/conf/context.xml | xmllint --xpath '/Context/@sessionCookiePath' - Expected result: sessionCookiePath="/ui" If the output does not match the expected result, this is a finding.
Fix: F-42905r679244_fix
Navigate to and open /usr/lib/vmware-vsphere-ui/server/conf/context.xml. Add the following configuration to the <Context> node: sessionCookiePath="/ui" Example: <Context useHttpOnly="true" sessionCookieName="VSPHERE-UI-JSESSIONID" sessionCookiePath="/ui">