Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-239673 | VCST-67-000022 | SV-239673r816744_rule | Medium |
Description |
---|
Enumeration techniques, such as URL parameter manipulation, rely on being able to obtain information about the web server's directory structure by locating directories without default pages. In this scenario, the web server will display to the user a listing of the files in the directory being accessed. By having a default hosted application web page, the anonymous web user will not obtain directory browsing information or an error message that reveals the server type and version. Ensuring that every document directory has an "index.jsp" (or equivalent) file is one approach to mitigating the vulnerability. |
STIG | Date |
---|---|
VMware vSphere 6.7 STS Tomcat Security Technical Implementation Guide | 2022-01-03 |
Check Text ( C-42906r816742_chk ) |
---|
Connect to the PSC, whether external or embedded. At the command prompt, execute the following command: # xmllint --format /usr/lib/vmware-sso/vmware-sts/conf/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/welcome-file-list' - Expected result: If the output of the command does not match the expected result, this is a finding. |
Fix Text (F-42865r816743_fix) |
---|
Connect to the PSC, whether external or embedded. Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml. Add the following section under the |