UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Production JBoss servers must not allow automatic application deployment.


Overview

Finding ID Version Rule ID IA Controls Severity
V-62311 JBOS-AS-000545 SV-76801r1_rule Medium
Description
When dealing with access restrictions pertaining to change control, it should be noted that any changes to the software and/or application server configuration can potentially have significant effects on the overall security of the system. Access restrictions for changes also include application software libraries. If the application server provides automatic code deployment capability, (where updates to applications hosted on the application server are automatically performed, usually by the developers' IDE tool), it must also provide a capability to restrict the use of automatic application deployment. Automatic code deployments are allowable in a development environment, but not in production.
STIG Date
JBoss EAP 6.3 Security Technical Implementation Guide 2020-06-12

Details

Check Text ( C-63115r1_chk )
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss.
Using the relevant OS commands and syntax, cd to the /bin/ folder.
Run the jboss-cli script.
Connect to the server and authenticate.
Run the command:

ls /subsystem=deployment-scanner/scanner=default

If "scan-enabled"=true, this is a finding.
Fix Text (F-68231r1_fix)
Determine the JBoss server configuration as being either standalone or domain.

Launch the relevant jboss-cli management interface substituting standalone or domain for

//bin/jboss-cli

connect to the server and run the command:

/subsystem=deployment-scanner/scanner=default:write-attribute(name=scan-enabled,value=false)