UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Lighttpd must prohibit non-privileged accounts from accessing the application, libraries, and configuration files.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240265 VRAU-LI-000425 SV-240265r879753_rule Medium
Description
As a rule, accounts on the Lighttpd server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the Lighttpd server. The resources to which these accounts have access must also be closely monitored and controlled. Only the system administrator needs access to all the system's capabilities, while the web administrator and associated staff require access and control of the web content and the Lighttpd server configuration files.
STIG Date
VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide 2023-09-12

Details

Check Text ( C-43498r854825_chk )
At the command prompt, execute the following command:

stat -c "%a %g %G %n" `find /opt/vmware/share/htdocs /opt/vmware/etc/lighttpd /opt/vmware/share/lighttpd -type f` | awk '$1 !~ /^..0/ || $3 !~ /root/ {print}'

If any files are returned, this is a finding.
Fix Text (F-43457r667971_fix)
At the command prompt, enter the followings commands:

Note: Replace for the name of the file that was returned.

chown root:root

chmod 640

Repeat the commands for each file that was returned.