VMware vSphere 6.7 VAMI-lighttpd Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 27
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 27
- V-239715 Medium descriptioncheck VAMI must limit the number of simultaneous requests.
- V-239716 High descriptioncheck VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.
- V-239717 Medium check VAMI must use cryptography to protect the integrity of remote sessions.
- V-239718 Medium check VAMI must be configured to monitor remote access.
- V-239719 Medium check VAMI must generate log records for system startup and shutdown.
- V-239720 Medium check VAMI must produce log records containing sufficient information to establish what type of events occurred.
- V-239721 Medium check VAMI log files must only be accessible by privileged users.
- V-239722 Medium check Rsyslog must be configured to monitor VAMI logs.
- V-239723 Medium check VAMI server binaries and libraries must be verified for their integrity.
- V-239724 Medium check VAMI must only load allowed server modules.
- V-239725 Medium check VAMI must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
- V-239726 Medium check VAMI must explicitly disable Multipurpose Internet Mail Extensions (MIME) mappings based on "Content-Type".
- V-239727 Medium check VAMI must remove all mappings to unused scripts.
- V-239728 Medium check VAMI must have resource mappings set to disable the serving of certain file types.
- V-239729 Medium check VAMI must not have the Web Distributed Authoring (WebDAV) servlet installed.
- V-239730 Medium check VAMI must prevent hosted applications from exhausting system resources.
- V-239731 Medium check VAMI must not have any symbolic links in the web content directory tree.
- V-239732 Medium check VAMI must protect the keystore from unauthorized access.
- V-239733 Medium check VAMI must restrict access to the web root.
- V-239734 Medium check VAMI must protect against or limit the effects of HTTP types of denial-of-service (DoS) attacks.
- V-239735 Medium check VAMI must set the encoding for all text mime types to UTF-8.
- V-239736 Medium check VAMI must disable directory browsing.
- V-239737 Medium check VAMI must not be configured to use "mod_status".
- V-239738 Medium check VAMI must have debug logging disabled.
- V-239739 Medium check VAMI configuration files must be protected from unauthorized access.
- V-239740 Medium check VAMI must be protected from being stopped by a non-privileged user.
- V-239741 High check VAMI must implement TLS1.2 exclusively.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCLD-67-000001
- Vuln IDs
-
- V-239715
- Rule IDs
-
- SV-239715r816779_rule
Checks: C-42948r816778_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # grep "server.max-connections = 1024" /opt/vmware/etc/lighttpd/lighttpd.conf Expected result: server.max-connections = 1024 If the output does not match the expected result, this is a finding.
Fix: F-42907r679254_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: server.max-connections = 1024
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- VCLD-67-000002
- Vuln IDs
-
- V-239716
- Rule IDs
-
- SV-239716r816781_rule
Checks: C-42949r816780_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "ssl.cipher-list" Expected result: ssl.cipher-list = "!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES" If the output does not match the expected result, this is a finding.
Fix: F-42908r679257_fix
Navigate to and open /etc/applmgmt/appliance/lighttpd.conf. Add or reconfigure the following value: ssl.cipher-list = "!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES"
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- VCLD-67-000003
- Vuln IDs
-
- V-239717
- Rule IDs
-
- SV-239717r816783_rule
Checks: C-42950r816782_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "ssl.engine" Expected result: ssl.engine = "enable" If the output does not match the expected result, this is a finding.
Fix: F-42909r679260_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: ssl.engine = "enable"
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VCLD-67-000004
- Vuln IDs
-
- V-239718
- Rule IDs
-
- SV-239718r816785_rule
Checks: C-42951r816784_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/server\.modules/,/\)/'|grep mod_accesslog Expected result: "mod_accesslog", If the output does not match the expected result, this is a finding.
Fix: F-42910r679263_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add the following value in the "server.modules" section: mod_accesslog The result should be similar to the following: server.modules = ( "mod_access", "mod_accesslog", "mod_proxy", "mod_cgi", "mod_rewrite", "mod_magnet", "mod_setenv", # 7 )
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VCLD-67-000005
- Vuln IDs
-
- V-239719
- Rule IDs
-
- SV-239719r816787_rule
Checks: C-42952r816786_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "server.errorlog" Expected result: server.errorlog = "/opt/vmware/var/log/lighttpd/error.log" If the output does not match the expected result, this is a finding.
Fix: F-42911r679266_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: server.errorlog = "/opt/vmware/var/log/lighttpd/error.log"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VCLD-67-000006
- Vuln IDs
-
- V-239720
- Rule IDs
-
- SV-239720r816789_rule
Checks: C-42953r816788_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # grep "^accesslog.format" /opt/vmware/etc/lighttpd/lighttpd.conf The default commented, accesslog format is acceptable for this requirement. No output should be returned. If the command returns any output, this is a finding.
Fix: F-42912r679269_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Comment any existing accesslog.format lines by adding a "#" at the beginning of the line.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VCLD-67-000011
- Vuln IDs
-
- V-239721
- Rule IDs
-
- SV-239721r816791_rule
Checks: C-42954r816790_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # stat -c "%n has %a permissions and is owned by %U:%G" /opt/vmware/var/log/lighttpd/*.log Expected result: /opt/vmware/var/log/lighttpd/access.log has 640 permissions and is owned by root:root /opt/vmware/var/log/lighttpd/error.log has 640 permissions and is owned by root:root If the output does not match the expected result, this is a finding.
Fix: F-42913r679272_fix
At the command prompt, enter the following command: # chown root:root /opt/vmware/var/log/lighttpd/*.log # chmod 640 /opt/vmware/var/log/lighttpd/*.log
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- VCLD-67-000014
- Vuln IDs
-
- V-239722
- Rule IDs
-
- SV-239722r816793_rule
Checks: C-42955r816792_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # grep -v "^#" /etc/vmware-syslog/stig-services-vami.conf Expected result: input(type="imfile" File="/opt/vmware/var/log/lighttpd/access.log" Tag="vami-access" Severity="info" Facility="local0") If the file does not exist, this is a finding. If the output of the command does not match the expected result above, this is a finding.
Fix: F-42914r679275_fix
Navigate to and open /etc/vmware-syslog/stig-services-vami.conf. Create the file if it does not exist. Set the contents of the file as follows: input(type="imfile" File="/opt/vmware/var/log/lighttpd/access.log" Tag="vami-access" Severity="info" Facility="local0")
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCLD-67-000015
- Vuln IDs
-
- V-239723
- Rule IDs
-
- SV-239723r816795_rule
Checks: C-42956r816794_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # rpm -qa|grep lighttpd|xargs rpm -V|grep -vE "lighttpd.conf|vami-lighttp.*\.service" If the command returns any output, this is a finding.
Fix: F-42915r679278_fix
If the VAMI binaries have been modified from the default state when deployed as part of the VCSA, the system must be wiped and redeployed or restored from backup. VMware does not recommend or support recovering from such a state by reinstalling RPMs or similar efforts.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000016
- Vuln IDs
-
- V-239724
- Rule IDs
-
- SV-239724r816797_rule
Checks: C-42957r816796_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/server\.modules/,/\)/' Expected result: server.modules = ( "mod_access", "mod_accesslog", "mod_proxy", "mod_cgi", "mod_rewrite", "mod_magnet", "mod_setenv", # 7 ) If the output does not match the expected result, this is a finding.
Fix: F-42916r679281_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Configure the "server.modules" section to the following: server.modules = ( "mod_access", "mod_accesslog", "mod_proxy", "mod_cgi", "mod_rewrite", ) server.modules += ( "mod_magnet" )
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000017
- Vuln IDs
-
- V-239725
- Rule IDs
-
- SV-239725r816799_rule
Checks: C-42958r816798_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/mimetype\.assign/,/\)/'|grep -E "\.sh|\.csh" If the command returns any value, this is a finding.
Fix: F-42917r679284_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Remove any lines that reference ".sh" or ".csh" from the "mimetype.assign" section.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000018
- Vuln IDs
-
- V-239726
- Rule IDs
-
- SV-239726r816801_rule
Checks: C-42959r816800_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "mimetype.use-xattr" Expected result: mimetype.use-xattr = "disable" If the output does not match the expected result, this is a finding.
Fix: F-42918r679287_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: mimetype.use-xattr = "disable"
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000019
- Vuln IDs
-
- V-239727
- Rule IDs
-
- SV-239727r816803_rule
Checks: C-42960r816802_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/cgi\.assign/,/\)/' Expected result: cgi.assign = ( ".pl" => "/usr/bin/perl", ".cgi" => "/usr/bin/perl", ".rb" => "/usr/bin/ruby", ".erb" => "/usr/bin/eruby", ".py" => "/usr/bin/python", # 5 ) If the output does not match the expected result, this is a finding.
Fix: F-42919r679290_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Configure the "cgi.assign" section to the following: cgi.assign = ( ".pl" => "/usr/bin/perl", ".cgi" => "/usr/bin/perl", ".rb" => "/usr/bin/ruby", ".erb" => "/usr/bin/eruby", ".py" => "/usr/bin/python", # 5 )
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000020
- Vuln IDs
-
- V-239728
- Rule IDs
-
- SV-239728r816805_rule
Checks: C-42961r816804_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "url.access-deny" Expected result: url.access-deny = ("~", ".inc") If the output does not match the expected result, this is a finding.
Fix: F-42920r679293_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: url.access-deny = ( "~", ".inc" )
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000021
- Vuln IDs
-
- V-239729
- Rule IDs
-
- SV-239729r816807_rule
Checks: C-42962r816806_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/server\.modules/,/\)/'|grep mod_webdav If any value is returned, this is a finding.
Fix: F-42921r679296_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Delete or comment out the "mod_webdav" line. The line may be in an included config and not in the parent config.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000022
- Vuln IDs
-
- V-239730
- Rule IDs
-
- SV-239730r816809_rule
Checks: C-42963r816808_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "server.max-keep-alive-idle" Expected result: server.max-keep-alive-idle = 30 If the output does not match the expected result, this is a finding.
Fix: F-42922r679299_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf file. Add or reconfigure the following value: server.max-keep-alive-idle = 30
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCLD-67-000023
- Vuln IDs
-
- V-239731
- Rule IDs
-
- SV-239731r816811_rule
Checks: C-42964r816810_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # find /opt/vmware/share/htdocs -type l If any files are listed, this is a finding.
Fix: F-42923r679302_fix
At the command prompt, enter the following command: # unlink <file_name> Note: Replace <file_name> for the name of any files that were returned. Repeat the command for each file that was listed.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- VCLD-67-000025
- Vuln IDs
-
- V-239732
- Rule IDs
-
- SV-239732r816813_rule
Checks: C-42965r816812_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # stat -c "%n has %a permissions and is owned by %U:%G" /etc/applmgmt/appliance/server.pem Expected result: /etc/applmgmt/appliance/server.pem has 600 permissions and is owned by root:root If the output does not match the expected result, this is a finding.
Fix: F-42924r679305_fix
At the command prompt, execute the following commands: # chown root:root /etc/applmgmt/appliance/server.pem # chmod 600 /etc/applmgmt/appliance/server.pem
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- VCLD-67-000026
- Vuln IDs
-
- V-239733
- Rule IDs
-
- SV-239733r816815_rule
Checks: C-42966r816814_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # find /opt/vmware/share/htdocs/ -xdev -type d -a '(' -not -perm 0755 -o -not -user root -o -not -group root ')' -exec ls -ld {} \; If any files are returned, this is a finding.
Fix: F-42925r679308_fix
At the command prompt, execute the following commands: # chmod 0755 <directory> # chown root:root <directory> Note: Substitute <directory> with each directory returned from the check.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- VCLD-67-000027
- Vuln IDs
-
- V-239734
- Rule IDs
-
- SV-239734r816817_rule
Checks: C-42967r816816_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "server.max-fds" Expected result: server.max-fds = 2048 If the output does not match the expected result, this is a finding.
Fix: F-42926r679311_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: server.max-fds = 2048
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCLD-67-000028
- Vuln IDs
-
- V-239735
- Rule IDs
-
- SV-239735r816819_rule
Checks: C-42968r816818_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/mimetype\.assign/,/\)/'|grep "text/"|grep -v "charset=utf-8" If the command returns any value, this is a finding.
Fix: F-42927r679314_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Navigate to the "mimetype.assign" block. Replace all the mappings whose assigned type is "text/*" with mappings for UTF-8 encoding, as follows: ".css" => "text/css; charset=utf-8", ".html" => "text/html; charset=utf-8", ".htm" => "text/html; charset=utf-8", ".js" => "text/javascript; charset=utf-8", ".asc" => "text/plain; charset=utf-8", ".c" => "text/plain; charset=utf-8", ".cpp" => "text/plain; charset=utf-8", ".log" => "text/plain; charset=utf-8", ".conf" => "text/plain; charset=utf-8", ".text" => "text/plain; charset=utf-8", ".txt" => "text/plain; charset=utf-8", ".spec" => "text/plain; charset=utf-8", ".dtd" => "text/xml; charset=utf-8", ".xml" => "text/xml; charset=utf-8",
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLD-67-000029
- Vuln IDs
-
- V-239736
- Rule IDs
-
- SV-239736r816821_rule
Checks: C-42969r816820_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "dir-listing.activate" Expected result: dir-listing.activate = "disable" If the output does not match the expected result, this is a finding.
Fix: F-42928r679317_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: dir-listing.activate = "disable"
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLD-67-000030
- Vuln IDs
-
- V-239737
- Rule IDs
-
- SV-239737r816823_rule
Checks: C-42970r816822_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/server\.modules/,/\)/'|grep mod_status If any value is returned, this is a finding.
Fix: F-42929r679320_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Remove the line containing "mod_status". The line may be in an included config and not in the parent config itself.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCLD-67-000031
- Vuln IDs
-
- V-239738
- Rule IDs
-
- SV-239738r816825_rule
Checks: C-42971r816824_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "debug.log-request-handling" Expected result: debug.log-request-handling = "disable" If the output does not match the expected result, this is a finding.
Fix: F-42930r679323_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Add or reconfigure the following value: debug.log-request-handling = "disable"
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VCLD-67-000032
- Vuln IDs
-
- V-239739
- Rule IDs
-
- SV-239739r816827_rule
Checks: C-42972r816826_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # stat -c "%n permissions are %a and ownership is %U:%G" /opt/vmware/etc/lighttpd/lighttpd.conf /etc/applmgmt/appliance/lighttpd.conf Expected result: /opt/vmware/etc/lighttpd/lighttpd.conf permissions are 644 and ownership is root:root /etc/applmgmt/appliance/lighttpd.conf permissions are 644 and ownership is root:root If the output does not match the expected result, this is a finding.
Fix: F-42931r679326_fix
At the command prompt, enter the following command: # chmod 644 <file> # chown root:root <file> Note: Replace <file> with every file returned from the command in the check.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VCLD-67-000033
- Vuln IDs
-
- V-239740
- Rule IDs
-
- SV-239740r816829_rule
Checks: C-42973r816828_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # ps -f -U root | awk '$0 ~ /vami-lighttpd/ && $0 !~ /awk/ {print $1}' Expected result: root If the output does not match the expected result, this is a finding.
Fix: F-42932r679329_fix
Navigate to and open /usr/lib/systemd/system/vami-lighttp.service in a text editor. Under the "[Service]" section, remove the line that beings with "User=". At the command prompt, execute the following command: # service vami-lighttp restart
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- VCLD-67-000034
- Vuln IDs
-
- V-239741
- Rule IDs
-
- SV-239741r816831_rule
Checks: C-42974r816830_chk
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "ssl.use" Expected result: ssl.use-tlsv12 = "enable" ssl.use-sslv2 = "disable" ssl.use-sslv3 = "disable" ssl.use-tlsv10 = "disable" ssl.use-tlsv11 = "disable" If the output does not match the expected result, this is a finding.
Fix: F-42933r679332_fix
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf. Replace any and all "ssl.use-*" lines with following: ssl.use-tlsv12 = "enable" ssl.use-sslv2 = "disable" ssl.use-sslv3 = "disable" ssl.use-tlsv10 = "disable" ssl.use-tlsv11 = "disable"