VMware vSphere 6.7 Virgo-Client Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-257288 High The version of Virgo-Client running on the system must be a supported version.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCFL-67-000001
- Vuln IDs
-
- V-239743
- Rule IDs
-
- SV-239743r879511_rule
Checks: C-42976r679454_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector[@port="9090"]/@connectionTimeout' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: connectionTimeout="20000" If the output does not match the expected result, this is a finding.
Fix: F-42935r679455_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Configure each <Connector> node with the following: connectionTimeout="20000"
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCFL-67-000002
- Vuln IDs
-
- V-239744
- Rule IDs
-
- SV-239744r879511_rule
Checks: C-42977r679457_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector/@maxThreads' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: maxThreads="800" maxThreads="800" If the output does not match the expected result, this is a finding.
Fix: F-42936r679458_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Configure each <Connector> node with the following: maxThreads="800"
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCFL-67-000003
- Vuln IDs
-
- V-239745
- Rule IDs
-
- SV-239745r879511_rule
Checks: C-42978r679460_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector/@maxPostSize' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: XPath set is empty If the output does not match the expected result, this is a finding.
Fix: F-42937r679461_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Navigate to each of the <Connector> nodes. Remove any configuration for "maxPostSize".
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCFL-67-000004
- Vuln IDs
-
- V-239746
- Rule IDs
-
- SV-239746r879511_rule
Checks: C-42979r679463_chk
At the command prompt, execute the following command: # xmllint --xpath '/Context/@useHttpOnly' /usr/lib/vmware-vsphere-client/server/configuration/context.xml Expected result: useHttpOnly="true" If the output does not match the expected result, this is a finding.
Fix: F-42938r679464_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/context.xml. Configure the <Context> node as follows: <Context useHttpOnly="true">
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- VCFL-67-000005
- Vuln IDs
-
- V-239747
- Rule IDs
-
- SV-239747r879519_rule
Checks: C-42980r679466_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector[@port=9443]/SSLHostConfig/@ciphers' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: ciphers="TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA" If the output does not match the expected result, this is a finding.
Fix: F-42939r679467_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Ensure that the SSLHostConfig contains the following value: ciphers="TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA"
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- VCFL-67-000006
- Vuln IDs
-
- V-239748
- Rule IDs
-
- SV-239748r879520_rule
Checks: C-42981r679469_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector[@port=9443]/@SSLEnabled' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: SSLEnabled="true" If the output does not match the expected result, this is a finding.
Fix: F-42940r679470_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Ensure that the <Connector> node with 'port=9443' contains the following value: SSLEnabled="true"
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001453
- Version
- VCFL-67-000007
- Vuln IDs
-
- V-239749
- Rule IDs
-
- SV-239749r879520_rule
Checks: C-42982r679472_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector[@port=9443]/SSLHostConfig/@protocols' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: protocols="TLSv1.2" If the output does not match the expected result, this is a finding.
Fix: F-42941r679473_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Ensure that the <SSLHostConfig> node contains the following value: protocols="TLSv1.2"
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- VCFL-67-000008
- Vuln IDs
-
- V-239750
- Rule IDs
-
- SV-239750r879520_rule
Checks: C-42983r679475_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector[@port=9443]/@scheme' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: scheme="https" If the output does not match the expected result, this is a finding.
Fix: F-42942r679476_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Ensure that the <Connector> node with 'port=9443' contains the following value: scheme="https"
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VCFL-67-000009
- Vuln IDs
-
- V-239751
- Rule IDs
-
- SV-239751r879521_rule
Checks: C-42984r679478_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/Server/Service/Engine/Host/Valve[@className="org.apache.catalina.valves.AccessLogValve"]'/@pattern - Expected result: pattern="%h %{x-forwarded-for}i %l %u %t &quot;%r&quot; %s %b %{#hashedSessionId#}s %I %D" If the output does not match the expected result, this is a finding.
Fix: F-42943r679479_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Ensure the log pattern in the "org.apache.catalina.valves.AccessLogValve" node is set to the following: pattern="%h %{x-forwarded-for}i %l %u %t "%r" %s %b %{#hashedSessionId#}s %I %D"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VCFL-67-000010
- Vuln IDs
-
- V-239752
- Rule IDs
-
- SV-239752r879559_rule
Checks: C-42985r679481_chk
At the command prompt, execute the following command: # grep StreamRedirectFile /etc/vmware/vmware-vmon/svcCfgfiles/vsphere-client.json Expected result: "StreamRedirectFile": "%VMWARE_LOG_DIR%/vmware/vsphere-client/logs/vsphere-client-runtime.log", If there is no log file specified for the "StreamRedirectFile" setting, this is a finding.
Fix: F-42944r679482_fix
Navigate to and open /etc/vmware/vmware-vmon/svcCfgfiles/vsphere-client.json. Below the last line of the "PreStartCommandArg" block, add the following line: "StreamRedirectFile": "%VMWARE_LOG_DIR%/vmware/vsphere-client/logs/vsphere-client-runtime.log", Restart the appliance for changes to take effect.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCFL-67-000012
- Vuln IDs
-
- V-239753
- Rule IDs
-
- SV-239753r879584_rule
Checks: C-42986r679484_chk
At the command prompt, execute the following command: # rpm -V vsphere-client|grep "^..5......"|grep -E "\.war|\.jar|\.sh|\.py" If there is any output, this is a finding.
Fix: F-42945r679485_fix
Reinstall the VCSA or roll back to a snapshot. Modifying the vSphere Client installation files manually is not supported by VMware.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCFL-67-000013
- Vuln IDs
-
- V-239754
- Rule IDs
-
- SV-239754r879587_rule
Checks: C-42987r679487_chk
At the command prompt, execute the following command: # grep -En '(x-csh<)|(x-sh<)|(x-shar<)|(x-ksh<)' /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml If the command produces any output, this is a finding.
Fix: F-42946r679488_fix
Open /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml in a text editor. Remove any and all of the following nodes lines: <mime-type>application/x-csh</mime-type> <mime-type>application/x-shar</mime-type> <mime-type>application/x-sh</mime-type> <mime-type>application/x-ksh</mime-type>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCFL-67-000014
- Vuln IDs
-
- V-239755
- Rule IDs
-
- SV-239755r879587_rule
Checks: C-42988r679490_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/servlet-mapping/servlet-name[text()="jsp"]/parent::servlet-mapping' - Expected result: <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping> If the output of the command does not match the expected result, this is a finding.
Fix: F-42947r679491_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>. Configure the <servlet-mapping> node to look like the code snippet below: <!-- The mappings for the JSP servlet --> <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCFL-67-000015
- Vuln IDs
-
- V-239756
- Rule IDs
-
- SV-239756r879587_rule
Checks: C-42989r679493_chk
At the command prompt, execute the following command: # grep -n -i 'webdav' /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml If the command produces any output, this is a finding.
Fix: F-42948r679494_fix
Navigate to and open all listed files. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>webdav</servlet-name>. Remove the WebDav servlet and any mapping associated with it.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCFL-67-000016
- Vuln IDs
-
- V-239757
- Rule IDs
-
- SV-239757r879587_rule
Checks: C-42990r679496_chk
At the command prompt, execute the following command: # grep JreMemoryLeakPreventionListener /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: <Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener" /> If the output of the command does not match the expected result, this is a finding.
Fix: F-42949r679497_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCFL-67-000017
- Vuln IDs
-
- V-239758
- Rule IDs
-
- SV-239758r879587_rule
Checks: C-42991r679499_chk
At the command prompt, execute the following command: # find /usr/lib/vmware-vsphere-client/server/work/ -type l -ls If the command produces any output, this is a finding.
Fix: F-42950r679500_fix
At the command prompt, execute the following commands: Note: Replace <file_name> for the name of any files that were returned. # unlink <file_name> Repeat the commands for each file that was returned.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- VCFL-67-000018
- Vuln IDs
-
- V-239759
- Rule IDs
-
- SV-239759r879613_rule
Checks: C-42992r679502_chk
At the command prompt, execute the following command: # stat -c "%n permissions are %a and is owned by %U:%G" /etc/vmware/vsphere-client/keystore.jks Expected result: /etc/vmware/vsphere-client/keystore.jks permissions are 640 and is owned by vsphere-client:users If the output of the command does not match the expected result, this is a finding.
Fix: F-42951r679503_fix
At the command prompt, execute the following command: # chmod 640 /etc/vmware/vsphere-client/keystore.jks # chown vsphere-client:users /etc/vmware/vsphere-client/keystore.jks
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- VCFL-67-000019
- Vuln IDs
-
- V-239760
- Rule IDs
-
- SV-239760r879631_rule
Checks: C-42993r679505_chk
At the command prompt, execute the following command: # find /usr/lib/vmware-vsphere-client/server -xdev -type f -a '(' -not -user vsphere-client -o '(' -not -group root -a -not -group users -not -group cis ')' ')' -exec ls -ld {} \; If the command produces any output, this is a finding.
Fix: F-42952r679506_fix
At the command prompt, execute the following command: #chown vsphere-client:root <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- VCFL-67-000020
- Vuln IDs
-
- V-239761
- Rule IDs
-
- SV-239761r879650_rule
Checks: C-42994r679508_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector/@acceptCount' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: acceptCount="300" acceptCount="300" If the output does not match the expected result, this is a finding.
Fix: F-42953r679509_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Configure each <Connector> node with the following: acceptCount="300"
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCFL-67-000021
- Vuln IDs
-
- V-239762
- Rule IDs
-
- SV-239762r879652_rule
Checks: C-42995r679511_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector/@URIEncoding' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: URIEncoding="UTF-8" URIEncoding="UTF-8" If the output does not match the expected result, this is a finding.
Fix: F-42954r679512_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Configure each <Connector> node with the following: URIEncoding="UTF-8"
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCFL-67-000022
- Vuln IDs
-
- V-239763
- Rule IDs
-
- SV-239763r879655_rule
Checks: C-42996r679514_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/welcome-file-list' - Expected result: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list> If the output of the command does not match the expected result, this is a finding.
Fix: F-42955r679515_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml. Inspect the file and ensure that it contains the following section: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCFL-67-000023
- Vuln IDs
-
- V-239764
- Rule IDs
-
- SV-239764r879655_rule
Checks: C-42997r679517_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="listings"]/parent::init-param' - Expected result: <init-param> <param-name>listings</param-name> <param-value>false</param-value> </init-param> If the output of the command does not match the expected result, this is a finding.
Fix: F-42956r679518_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml. Set the <param-value> to "false" in all <param-name>listing</param-name> nodes. Note: The setting should look like the following: <init-param> <param-name>listings</param-name> <param-value>false</param-value> </init-param>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCFL-67-000024
- Vuln IDs
-
- V-239765
- Rule IDs
-
- SV-239765r879655_rule
Checks: C-42998r679520_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector/@server' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: server="Anonymous" server="Anonymous" If the output does not match the expected result, this is a finding.
Fix: F-42957r679521_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Configure each <Connector> node with the following: server="Anonymous"
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCFL-67-000025
- Vuln IDs
-
- V-239766
- Rule IDs
-
- SV-239766r879655_rule
Checks: C-42999r679523_chk
At the command prompt, execute the following command: # grep allowTrace /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml If "allowTrace" is set to "true", this is a finding. If no line is returned, this is NOT a finding.
Fix: F-42958r679524_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml. Navigate to and locate: 'allowTrace="true"' Remove the 'allowTrace="true"' setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCFL-67-000026
- Vuln IDs
-
- V-239767
- Rule IDs
-
- SV-239767r879655_rule
Checks: C-43000r679526_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="debug"]/parent::init-param' - Expected result: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param> If the output of the command does not match the expected result, this is a finding.
Fix: F-42959r679527_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml. Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the following: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param>
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- VCFL-67-000027
- Vuln IDs
-
- V-239768
- Rule IDs
-
- SV-239768r879731_rule
Checks: C-43001r679529_chk
At the command prompt, execute the following command: # grep -v "^#" /etc/vmware-syslog/stig-vsphere-client.conf Expected result: input(type="imfile" File="/var/log/vmware/vsphere-client/logs/access/localhost_access*" Tag="client-access" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/vsphere-client/logs/vsphere-client-runtime*" Tag="client-runtime" Severity="info" Facility="local0") If the file does not exist, this is a finding. If the output of the command does not match the expected result, this is a finding.
Fix: F-42960r679530_fix
Navigate to and open /etc/vmware-syslog/stig-vsphere-client.conf. Create the file if it does not exist. Set the contents of the file as follows: input(type="imfile" File="/var/log/vmware/vsphere-client/logs/access/localhost_access*" Tag="client-access" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/vsphere-client/logs/vsphere-client-runtime*" Tag="client-runtime" Severity="info" Facility="local0")
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VCFL-67-000028
- Vuln IDs
-
- V-239769
- Rule IDs
-
- SV-239769r879756_rule
Checks: C-43002r679532_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/Service/Connector/@port' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: port="9090" port="9443" If the output does not match the expected result, this is a finding.
Fix: F-42961r679533_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml in a text editor. On the first <Connector>, with redirectPort="9443", configure the port as follows: port="9090" On the second <Connector>, with SSLEnabled="true", configure the port as follows: port="9443"
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VCFL-67-000029
- Vuln IDs
-
- V-239770
- Rule IDs
-
- SV-239770r879806_rule
Checks: C-43003r679535_chk
At the command prompt, execute the following command: # xmllint --format --xpath '/Server/@port' /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml Expected result: port="-1" If the output does not match the expected result, this is a finding.
Fix: F-42962r679536_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/tomcat-server.xml in a text editor. Ensure that the server port is disabled as follows: <Server port="-1">
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VCFL-67-000030
- Vuln IDs
-
- V-239771
- Rule IDs
-
- SV-239771r879810_rule
Checks: C-43004r679538_chk
At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/secure' - Expected result: <secure>true</secure> If the output of the command does not match the expected result, this is a finding.
Fix: F-42963r679539_fix
Navigate to and open /usr/lib/vmware-vsphere-client/server/configuration/conf/web.xml. Navigate to the /<web-apps>/<session-config>/<cookie-config> node and configure it as follows: <cookie-config> <http-only>true</http-only> <secure>true</secure> </cookie-config>
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VCFL-67-000999
- Vuln IDs
-
- V-257288
- Rule IDs
-
- SV-257288r919287_rule
Checks: C-60971r918897_chk
Virgo-Client 6.7 is no longer supported by the vendor. If the system is running Virgo-Client 6.7, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.