VCST-67-000012 - The Security Token Service must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

MIME mappings tell the Security Token Service what type of program various file types and extensions are and what external utilities or programs are needed to execute the file type. By ensuring that various shell script MIME types are not included in 'web.xml', the server is protected against malicious users tricking the server into executing shell command files.

Solution

Connect to the PSC, whether external or embedded.

Open /usr/lib/vmware-sso/vmware-sts/conf/web.xml in a text editor.

Remove the parent <mime-mapping> node of any line returned from the check.

Example:

<mime-mapping>
<extension>csh</extension>
<mime-type>application/x-csh</mime-type>
</mime-mapping>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000381, Rule-ID|SV-239663r816714_rule, STIG-ID|VCST-67-000012, Vuln-ID|V-239663

Plugin: Unix

Control ID: 08ea4a7b2a83fd397055f8c94e3fffbdeaddfbcd4d7aaf18858de24c29034349