VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 3
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 3
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCEM-70-000001
- Vuln IDs
-
- V-256673
- Rule IDs
-
- SV-256673r888575_rule
Checks: C-60348r888573_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector/@connectionTimeout' /usr/lib/vmware-eam/web/conf/server.xml Expected result: connectionTimeout="60000" If the output does not match the expected result, this is a finding.
Fix: F-60291r888574_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Configure the <Connector> node with the value: connectionTimeout="60000" Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCEM-70-000002
- Vuln IDs
-
- V-256674
- Rule IDs
-
- SV-256674r888578_rule
Checks: C-60349r888576_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Executor[@name="tomcatThreadPool"]/@maxThreads' /usr/lib/vmware-eam/web/conf/server.xml Expected result: maxThreads="300" If the output does not match the expected result, this is a finding.
Fix: F-60292r888577_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Navigate to the <Executor> mode with the name of "tomcatThreadPool" and configure with the value 'maxThreads="300"'. Note: The <Executor> node should be configured as follows: <Executor maxThreads="300" minSpareThreads="50" name="tomcatThreadPool" namePrefix="tomcat-http--"/> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCEM-70-000003
- Vuln IDs
-
- V-256675
- Rule IDs
-
- SV-256675r888581_rule
Checks: C-60350r888579_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector/@maxPostSize' /usr/lib/vmware-eam/web/conf/server.xml Expected result: XPath set is empty If the output does not match the expected result, this is a finding.
Fix: F-60293r888580_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Remove any configuration for "maxPostSize" from the <Connector> node. Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VCEM-70-000004
- Vuln IDs
-
- V-256676
- Rule IDs
-
- SV-256676r888584_rule
Checks: C-60351r888582_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/http-only' - Expected result: <http-only>true</http-only> If the output does not match the expected result, this is a finding.
Fix: F-60294r888583_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Navigate to the <session-config> node and configure it as follows: <session-config> <cookie-config> <http-only>true</http-only> <secure>true</secure> </cookie-config> <session-timeout>30</session-timeout> </session-config> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VCEM-70-000005
- Vuln IDs
-
- V-256677
- Rule IDs
-
- SV-256677r888587_rule
Checks: C-60352r888585_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Engine/Host/Valve[@className="org.apache.catalina.valves.AccessLogValve"]/@pattern' /usr/lib/vmware-eam/web/conf/server.xml Expected result: pattern="%h %{X-Forwarded-For}i %l %u %t [%I] &quot;%r&quot; %s %b [Processing time %D msec] &quot;%{User-Agent}i&quot;" If the output does not match the expected result, this is a finding.
Fix: F-60295r888586_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Inside the <Host> node, find the "AccessLogValve" <Valve> node and replace the "pattern" element as follows: pattern="%h %{X-Forwarded-For}i %l %u %t [%I] "%r" %s %b [Processing time %D msec] "%{User-Agent}i"" Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VCEM-70-000006
- Vuln IDs
-
- V-256678
- Rule IDs
-
- SV-256678r888590_rule
Checks: C-60353r888588_chk
At the command prompt, run the following command: # grep StreamRedirectFile /etc/vmware/vmware-vmon/svcCfgfiles/eam.json Expected output: "StreamRedirectFile" : "%VMWARE_LOG_DIR%/vmware/eam/jvm.log", If no log file is specified for the "StreamRedirectFile" setting, this is a finding.
Fix: F-60296r888589_fix
Navigate to and open: /etc/vmware/vmware-vmon/svcCfgfiles/eam.json Below the last line of the "PreStartCommandArg" block, add the following line: "StreamRedirectFile" : "%VMWARE_LOG_DIR%/vmware/eam/jvm.log", Restart the appliance for changes to take effect.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VCEM-70-000007
- Vuln IDs
-
- V-256679
- Rule IDs
-
- SV-256679r888593_rule
Checks: C-60354r888591_chk
At the command prompt, run the following command: # find /var/log/vmware/eam/web/ -xdev -type f -a '(' -perm -o+w -o -not -user eam -o -not -group users ')' -exec ls -ld {} \; If any files are returned, this is a finding.
Fix: F-60297r888592_fix
At the command prompt, run the following commands: # chmod o-w <file> # chown eam:users <file> Note: Substitute <file> with the listed file.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VCEM-70-000008
- Vuln IDs
-
- V-256680
- Rule IDs
-
- SV-256680r918904_rule
Checks: C-60355r918903_chk
At the command prompt, run the following command: # rpm -V vmware-eam|grep "^..5......" | grep -v 'c /' | grep -v -E ".installer|.properties|.xml" If there is any output, this is a finding.
Fix: F-60298r888595_fix
Reinstall the vCenter Server Appliance (VCSA) or roll back to a backup. Modifying the EAM installation files manually is not supported by VMware.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCEM-70-000009
- Vuln IDs
-
- V-256681
- Rule IDs
-
- SV-256681r888599_rule
Checks: C-60356r888597_chk
At the command prompt, run the following command: # ls -A /usr/lib/vmware-eam/web/webapps Expected result: eam If the output does not match the expected result, this is a finding.
Fix: F-60299r888598_fix
For each unexpected directory returned in the check, run the following command: # rm /usr/lib/vmware-eam/web/webapps/<NAME> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCEM-70-000010
- Vuln IDs
-
- V-256682
- Rule IDs
-
- SV-256682r888602_rule
Checks: C-60357r888600_chk
At the command prompt, run the following command: # grep UserDatabaseRealm /usr/lib/vmware-eam/web/conf/server.xml If the command produces any output, this is a finding.
Fix: F-60300r888601_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Remove the <Realm> node returned in the check. Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCEM-70-000011
- Vuln IDs
-
- V-256683
- Rule IDs
-
- SV-256683r888605_rule
Checks: C-60358r888603_chk
At the command prompt, run the following command: # grep "package.access" -A 5 /etc/vmware-eam/catalina.properties Expected result: package.access=\ sun.,\ org.apache.catalina.,\ org.apache.coyote.,\ org.apache.tomcat.,\ org.apache.jasper. If the output of the command does not match the expected result, this is a finding.
Fix: F-60301r888604_fix
Navigate to and open: /etc/vmware-eam/catalina.properties Ensure the "package.access" line is configured as follows: package.access=\ sun.,\ org.apache.catalina.,\ org.apache.coyote.,\ org.apache.tomcat.,\ org.apache.jasper. Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCEM-70-000012
- Vuln IDs
-
- V-256684
- Rule IDs
-
- SV-256684r888608_rule
Checks: C-60359r888606_chk
At the command prompt, run the following command: # grep -En '(x-csh<)|(x-sh<)|(x-shar<)|(x-ksh<)' /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml If the command produces any output, this is a finding.
Fix: F-60302r888607_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Remove all of the following nodes lines: <mime-type>application/x-csh</mime-type> <mime-type>application/x-shar</mime-type> <mime-type>application/x-sh</mime-type> <mime-type>application/x-ksh</mime-type> Restart the service with the following command: # vmon-cli --restart eam Note: Delete the entire mime-mapping node for the target mime-type. Example: <mime-mapping> <extension>sh</extension> <mime-type>application/x-sh</mime-type> </mime-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCEM-70-000013
- Vuln IDs
-
- V-256685
- Rule IDs
-
- SV-256685r888611_rule
Checks: C-60360r888609_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/servlet-mapping/servlet-name[text()="JspServlet"]/parent::servlet-mapping' - Expected result: <servlet-mapping> <servlet-name>JspServlet</servlet-name> <url-pattern>*.jsp</url-pattern> </servlet-mapping> If the output of the command does not match the expected result, this is a finding.
Fix: F-60303r888610_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>JspServlet</servlet-name>. Configure the <servlet-mapping> node to look like the code snippet below: <servlet-mapping> <servlet-name>JspServlet</servlet-name> <url-pattern>*.jsp</url-pattern> </servlet-mapping> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCEM-70-000014
- Vuln IDs
-
- V-256686
- Rule IDs
-
- SV-256686r888614_rule
Checks: C-60361r888612_chk
At the command prompt, run the following command: # grep -n 'webdav' /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml If the command produces any output, this is a finding.
Fix: F-60304r888613_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Find the <servlet-name>webdav</servlet-name> node and remove the entire parent <servlet> block. Find the <servlet-name>webdav</servlet-name> node and remove the entire parent <servlet-mapping> block. Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCEM-70-000015
- Vuln IDs
-
- V-256687
- Rule IDs
-
- SV-256687r888617_rule
Checks: C-60362r888615_chk
At the command prompt, run the following command: # grep JreMemoryLeakPreventionListener /usr/lib/vmware-eam/web/conf/server.xml Expected result: <Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/> If the output of the command does not match the expected result, this is a finding.
Fix: F-60305r888616_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node. Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VCEM-70-000016
- Vuln IDs
-
- V-256688
- Rule IDs
-
- SV-256688r888620_rule
Checks: C-60363r888618_chk
At the command prompt, run the following command: # find /usr/lib/vmware-eam/web/webapps/ -type l -ls If the command produces any output, this is a finding.
Fix: F-60306r888619_fix
At the command prompt, run the following command: Note: Replace <file_name> for the name of any files that were returned. unlink <file_name> Repeat the command for each file that was returned.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- VCEM-70-000017
- Vuln IDs
-
- V-256689
- Rule IDs
-
- SV-256689r888623_rule
Checks: C-60364r888621_chk
At the command prompt, run the following command: # find /usr/lib/vmware-eam/web/ -xdev -type f -a '(' -not -user root -o -not -group root ')' -exec ls -ld {} \; If the command produces any output, this is a finding.
Fix: F-60307r888622_fix
At the command prompt, run the following command: # chown root:root <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VCEM-70-000018
- Vuln IDs
-
- V-256690
- Rule IDs
-
- SV-256690r888626_rule
Checks: C-60365r888624_chk
At the command line, run the following command: # grep EXIT_ON_INIT_FAILURE /etc/vmware-eam/catalina.properties Expected result: org.apache.catalina.startup.EXIT_ON_INIT_FAILURE=true If the output of the command does not match the expected result, this is a finding.
Fix: F-60308r888625_fix
Navigate to and open: /etc/vmware-eam/catalina.properties Add or change the following line: org.apache.catalina.startup.EXIT_ON_INIT_FAILURE=true Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- VCEM-70-000019
- Vuln IDs
-
- V-256691
- Rule IDs
-
- SV-256691r888629_rule
Checks: C-60366r888627_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector/@acceptCount' /usr/lib/vmware-eam/web/conf/server.xml Expected result: acceptCount="300" If the output does not match the expected result, this is a finding.
Fix: F-60309r888628_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Configure the <Connector> node with the value: acceptCount="300" Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCEM-70-000020
- Vuln IDs
-
- V-256692
- Rule IDs
-
- SV-256692r888632_rule
Checks: C-60367r888630_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector/@URIEncoding' /usr/lib/vmware-eam/web/conf/server.xml Expected result: URIEncoding="UTF-8" If the output does not match the expected result, this is a finding.
Fix: F-60310r888631_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Configure the <Connector> node with the value: URIEncoding="UTF-8" Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VCEM-70-000021
- Vuln IDs
-
- V-256693
- Rule IDs
-
- SV-256693r888635_rule
Checks: C-60368r888633_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/filter-mapping/filter-name[text()="setCharacterEncodingFilter"]/parent::filter-mapping' - Expected result: <filter-mapping> <filter-name>setCharacterEncodingFilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> If the output is does not match the expected result, this is a finding. At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/filter/filter-name[text()="setCharacterEncodingFilter"]/parent::filter' - Expected result: <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> </init-param> <init-param> <param-name>ignore</param-name> <param-value>true</param-value> </init-param> <async-supported>true</async-supported> </filter> If the output is does not match the expected result, this is a finding.
Fix: F-60311r888634_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Configure the <web-app> node with the child nodes listed below: <filter-mapping> <filter-name>setCharacterEncodingFilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> </init-param> <init-param> <param-name>ignore</param-name> <param-value>true</param-value> </init-param> <async-supported>true</async-supported> </filter> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCEM-70-000022
- Vuln IDs
-
- V-256694
- Rule IDs
-
- SV-256694r888638_rule
Checks: C-60369r888636_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/welcome-file-list' - Expected result: <welcome-file-list> <welcome-file>index.jsp</welcome-file> </welcome-file-list> If the output does not match the expected result, this is a finding.
Fix: F-60312r888637_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Add the following section under the <web-apps> node: <welcome-file-list> <welcome-file>index.jsp</welcome-file> </welcome-file-list> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCEM-70-000023
- Vuln IDs
-
- V-256695
- Rule IDs
-
- SV-256695r888641_rule
Checks: C-60370r888639_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="listings"]/parent::init-param' - Expected result: XPath set is empty If the output of the command does not match the expected result, this is a finding.
Fix: F-60313r888640_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Find and remove the entire block returned in the check. Example: <init-param> <param-name>listings</param-name> <param-value>true</param-value> </init-param> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCEM-70-000024
- Vuln IDs
-
- V-256696
- Rule IDs
-
- SV-256696r888644_rule
Checks: C-60371r888642_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/error-page/exception-type["text()=java.lang.Throwable"]/parent::error-page' - Expected result: <error-page> <exception-type>java.lang.Throwable</exception-type> <location>/error.jsp</location> </error-page> If the output does not match the expected result, this is a finding.
Fix: F-60314r888643_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Add the following section under the <web-apps> node: <error-page> <exception-type>java.lang.Throwable</exception-type> <location>/error.jsp</location> </error-page> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCEM-70-000025
- Vuln IDs
-
- V-256697
- Rule IDs
-
- SV-256697r888647_rule
Checks: C-60372r888645_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Engine/Host/Valve[@className="org.apache.catalina.valves.ErrorReportValve"]' /usr/lib/vmware-eam/web/conf/server.xml Expected result: <Valve className="org.apache.catalina.valves.ErrorReportValve" showServerInfo="false" showReport="false"/> If the output of the command does not match the expected result, this is a finding.
Fix: F-60315r888646_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Locate the following Host block: <Host ...> ... </Host> Inside this block, add the following on a new line: <Valve className="org.apache.catalina.valves.ErrorReportValve" showServerInfo="false" showReport="false"/> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCEM-70-000026
- Vuln IDs
-
- V-256698
- Rule IDs
-
- SV-256698r918905_rule
Checks: C-60373r888648_chk
At the command prompt, run the following command: # xmllint --xpath '/Server/Service/Connector/@server' /usr/lib/vmware-eam/web/conf/server.xml Expected result: server="Anonymous" If the output of the command does not match the expected result, this is a finding.
Fix: F-60316r888649_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Configure the <Connector> node with the value: server="Anonymous" Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCEM-70-000027
- Vuln IDs
-
- V-256699
- Rule IDs
-
- SV-256699r888653_rule
Checks: C-60374r888651_chk
At the command prompt, run the following command: # grep allowTrace /usr/lib/vmware-eam/web/conf/server.xml If "allowTrace" is set to "true", this is a finding. If no line is returned, this is not a finding.
Fix: F-60317r888652_fix
Navigate to and open: /usr/lib/vmware-eam/web/conf/server.xml Locate and navigate to 'allowTrace="true"'. Remove the 'allowTrace="true"' setting. Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VCEM-70-000028
- Vuln IDs
-
- V-256700
- Rule IDs
-
- SV-256700r918907_rule
Checks: C-60375r918906_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '//param-name[text()="debug"]/parent::init-param' - Expected result: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param> If the output does not match the expected result, this is a finding. If no lines are returned, this is not a finding. If "XPath set is empty" is returned, this is not a finding.
Fix: F-60318r888655_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the following: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- VCEM-70-000029
- Vuln IDs
-
- V-256701
- Rule IDs
-
- SV-256701r888659_rule
Checks: C-60376r888657_chk
At the command prompt, run the following command: # rpm -V VMware-visl-integration|grep vmware-services-eam.conf|grep "^..5......" If the command returns any output, this is a finding.
Fix: F-60319r888658_fix
Navigate to and open: /etc/vmware-syslog/vmware-services-eam.conf Create the file if it does not exist. Set the contents of the file as follows: #eam.log input(type="imfile" File="/var/log/vmware/eam/eam.log" Tag="eam-main" Severity="info" Facility="local0") #eam web access logs input(type="imfile" File="/var/log/vmware/eam/web/localhost_access.log" Tag="eam-access" Severity="info" Facility="local0") #eam jvm logs input(type="imfile" File="/var/log/vmware/eam/jvm.log.stdout" Tag="eam-stdout" Severity="info" Facility="local0") input(type="imfile" File="/var/log/vmware/eam/jvm.log.stderr" Tag="eam-stderr" Severity="info" Facility="local0") #eam catalina logs input(type="imfile" File="/var/log/vmware/eam/web/catalina.log" Tag="eam-catalina" Severity="info" Facility="local0") #eam catalina localhost logs input(type="imfile" File="/var/log/vmware/eam/web/localhost.log" Tag="eam-catalina" Severity="info" Facility="local0") #eam firstboot logs input(type="imfile" File="/var/log/vmware/firstboot/eam_firstboot.py*.log" Tag="eam-firstboot" Severity="info" Facility="local0")
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VCEM-70-000030
- Vuln IDs
-
- V-256702
- Rule IDs
-
- SV-256702r888662_rule
Checks: C-60377r888660_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml | sed 's/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/secure' - Expected result: <secure>true</secure> If the output of the command does not match the expected result, this is a finding.
Fix: F-60320r888661_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Navigate to the /<web-apps>/<session-config>/<cookie-config> node and configure it as follows: <cookie-config> <http-only>true</http-only> <secure>true</secure> </cookie-config> Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VCEM-70-000031
- Vuln IDs
-
- V-256703
- Rule IDs
-
- SV-256703r888665_rule
Checks: C-60378r888663_chk
At the command prompt, run the following command: # grep 'bio.http.port' /etc/vmware-eam/catalina.properties Expected result: bio.http.port=15005 If the output of the command does not match the expected result, this is a finding.
Fix: F-60321r888664_fix
Navigate to and open: /etc/vmware-eam/catalina.properties Navigate to the port's specification section. Set the ESX Agent Manager port specifications according to the following: bio.http.port=15005 Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VCEM-70-000032
- Vuln IDs
-
- V-256704
- Rule IDs
-
- SV-256704r888668_rule
Checks: C-60379r888666_chk
At the command prompt, run the following command: # grep 'base.shutdown.port' /etc/vmware-eam/catalina.properties Expected result: base.shutdown.port=-1 If the output of the command does not match the expected result, this is a finding.
Fix: F-60322r888667_fix
Navigate to and open: /etc/vmware-eam/catalina.properties Add or modify the setting "base.shutdown.port=-1" in the "catalina.properties" file. Restart the service with the following command: # vmon-cli --restart eam
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VCEM-70-000033
- Vuln IDs
-
- V-256705
- Rule IDs
-
- SV-256705r888671_rule
Checks: C-60380r888669_chk
At the command prompt, run the following command: # xmllint --format /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/servlet/servlet-name[text()="default"]/../init-param/param-name[text()="readonly"]/../param-value[text()="false"]' - Expected result: XPath set is empty If the output of the command does not match the expected result, this is a finding.
Fix: F-60323r888670_fix
Navigate to and open: /usr/lib/vmware-eam/web/webapps/eam/WEB-INF/web.xml Navigate to the /<web-apps>/<servlet>/<servlet-name>default</servlet-name>/ node and remove the following node: <init-param> <param-name>readonly</param-name> <param-value>false</param-value> </init-param> Restart the service with the following command: # vmon-cli --restart eam