Check: VCLD-67-000033
VMware vSphere 6.7 VAMI-lighttpd STIG:
VCLD-67-000033
(in versions v1 r3 through v1 r2)
Title
VAMI must be protected from being stopped by a non-privileged user. (Cat II impact)
Discussion
An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to put in place changes the attacker made to the web server configuration. Therefore, only administrators should ever be able to stop VAMI. The VAMI is configured out of the box to be owned by root. This configuration must be verified and maintained.
Check Content
Note: The below command must be run from a bash shell and not from a shell generated by the "appliance shell". Use the "chsh" command to change the shell for the account to "/bin/bash". At the command prompt, execute the following command: # ps -f -U root | awk '$0 ~ /vami-lighttpd/ && $0 !~ /awk/ {print $1}' Expected result: root If the output does not match the expected result, this is a finding.
Fix Text
Navigate to and open /usr/lib/systemd/system/vami-lighttp.service in a text editor. Under the "[Service]" section, remove the line that beings with "User=". At the command prompt, execute the following command: # service vami-lighttp restart
Additional Identifiers
Rule ID: SV-239740r879806_rule
Vulnerability ID: V-239740
Group Title: SRG-APP-000435-WSR-000147
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002385 |
The information system protects against or limits the effects of organization-defined types of denial of service attacks by employing organization-defined security safeguards. |
Controls
Number | Title |
---|---|
SC-5 |
Denial Of Service Protection |