Check: ISEC-06-551310
ISEC7 Sphere STIG:
ISEC-06-551310
(in version v2 r1)
Title
The ISEC7 EMM Suite must remove any unnecessaryusers or groups that have permissions to the server.xml file in Apache Tomcat. (Cat II impact)
Discussion
Tomcat uses a port (defaults to 8005) as a shutdown port. Someone could Telnet to the machine using this port and send the default command SHUTDOWN. Tomcat and all web apps would shut down in that case, which is a denial of service attack and would cause an unwanted service interruption.
Check Content
Verify unnecessaryusers or groups that have permissions to the Server.xml file in Apache Tomcat have been removed. Browse to ProgramFiles\Isec7 EMM Suite\Tomcat\Conf and select Server.xml Right click and select Properties. Select the security tab and verify no unnecessaryaccount or groups have been granted permissions to the file. Verify no unnecessaryusers or groups have permissions to the file. If unnecessaryusers or groups that have permissions to the Server.xml file in Apache Tomcat have not been removed, this is a finding.
Fix Text
Log in to the ISEC7 EMM Suite server. Browse to ProgramFiles\Isec7 EMM Suite\Tomcat\Conf and select Server.xml Right click and select Properties. Select the security tab and remove unnecessaryaccounts or groups that have been granted permissions to the Server.xml file.
Additional Identifiers
Rule ID: SV-224790r505933_rule
Vulnerability ID: V-224790
Group Title: SRG-APP-000380
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001813 |
The information system enforces access restrictions. |
Controls
Number | Title |
---|---|
CM-5 (1) |
Automated Access Enforcement / Auditing |