VCST-67-000025 - The Security Token Service must not enable support for TRACE requests.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

'Trace' is a technique for a user to request internal information about Tomcat. This is useful during product development but should not be enabled in production. Allowing an attacker to conduct a Trace operation against the Security Token Service will expose information that would be useful to perform a more targeted attack. The Security Token Service provides the 'allowTrace' parameter as a means to disable responding to Trace requests.

Solution

Connect to the PSC, whether external or embedded.

Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/server.xml.

Navigate to and locate:
'allowTrace='true''

Remove the 'allowTrace='true'' setting.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001312, Rule-ID|SV-239676r816753_rule, STIG-ID|VCST-67-000025, Vuln-ID|V-239676

Plugin: Unix

Control ID: ae10d0d4e611482dc78a6e8b0a39eb7ef80322e3439a7af05344209680051d60