VCLD-67-000029 - VAMI must disable directory browsing.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The goal is to completely control the web user's experience in navigating any portion of the web document root directories. Ensuring all web content directories have at least the equivalent of an 'index.html' file is a significant factor to accomplish this end.

Enumeration techniques, such as URL parameter manipulation, rely on being able to obtain information about the web server's directory structure by locating directories without default pages. In this scenario, the web server will display to the user a listing of the files in the directory being accessed. By having a default hosted application web page, the anonymous web user will not obtain directory browsing information or an error message that reveals the server type and version.

Solution

Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf.

Add or reconfigure the following value:

dir-listing.activate = 'disable'

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001312, Rule-ID|SV-239736r816821_rule, STIG-ID|VCLD-67-000029, Vuln-ID|V-239736

Plugin: Unix

Control ID: a54d132f7977587fd0ebb7e2fcc70e40e692785aeaa8f761f301695adc9cf4ea