Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-62221 | JBOS-AS-000045 | SV-76711r1_rule | High |
Description |
---|
Silent Authentication is a configuration setting that allows local OS users access to the JBoss server and a wide range of operations without specifically authenticating on an individual user basis. By default $localuser is a Superuser. This introduces an integrity and availability vulnerability and violates best practice requirements regarding accountability. |
STIG | Date |
---|---|
JBoss EAP 6.3 Security Technical Implementation Guide | 2017-03-20 |
Check Text ( C-63025r1_chk ) |
---|
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the Run the jboss-cli script. Connect to the server and authenticate. Verify that Silent Authentication has been removed from the default Application security realm. Run the following command. For standalone servers, run the following command: "ls /core-service=management/securityrealm=ApplicationRealm/authentication" For managed domain installations, run the following command: "ls /host=HOST_NAME/core-service=management/securityrealm=ApplicationRealm/authentication" If "local" is returned, this is a finding. |
Fix Text (F-68141r1_fix) |
---|
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the Run the jboss-cli script. Connect to the server and authenticate. Remove the local element from the Application Realm. For standalone servers, run the following command: /core-service=management/securityrealm= ApplicationRealm/authentication=local:remove For managed domain installations, run the following command: /host=HOST_NAME/core-service=management/securityrealm= ApplicationRealm/authentication=local:remove |