TCAT-AS-000790 - Access to Tomcat manager application must be restricted.

Information

The Tomcat manager application is used to manage the Tomcat server and the applications that run on Tomcat. By default, the manager application is only accessible via the localhost. Exposing the management application to any network interface that is available to non-administrative personnel leaves the Tomcat server vulnerable to attempts to access the management application. To mitigate this risk, the management application should only be run on the localhost or on network interfaces tied to a dedicated management network.

This setting is managed in the $CATALINA_BASE/conf/server.xml file.

Solution

Update system documentation (SSP) and identify the documented management networks as well as the documented client networks.

As a privileged user, edit the $CATALINA_BASE/webapps/manager/META-INF/context.xml file.

Configure the RemoteAddrValve or RemoteCIDRValve to restrict access to the management application. This can be a restriction to the localhost or to specific management networks or hosts on the management network. Choice of address or CIDR block usage is based on operational requirements.

Order is allow from, deny from. See Tomcat Valve component documentation at the Tomcat website for specific details and additional configuration options.

Test the access restrictions once configured to assure compliance.

EXAMPLES:

- RemoteAddrValve Localhost only IPV4 and IPV6
<Valve className='org.apache.catalina.valves.RemoteAddrValve'
allow='127.d+.d+.d+|::1|0:0:0:0:0:0:0:1'/>

- Localhost and Management network CIDR block IPV4 and IPV6
<Valve className='org.apache.catalina.valves.RemoteCIDRValve'
allow='127.0.0.1, ::1',192.168.1.0/24/>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apache_Tomcat_Application_Server_9_V2R4_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-2, CAT|II, CCI|CCI-001082, Rule-ID|SV-222970r615938_rule, STIG-ID|TCAT-AS-000790, STIG-Legacy|SV-111463, STIG-Legacy|V-102523, Vuln-ID|V-222970

Plugin: Unix

Control ID: 9aedd3942ec9b5ff968eaff569b96781897c5f63f1a388580225a868c2b82ae8