TCAT-AS-000390 - $CATALINA_HOME/bin folder permissions must be set to 750.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permissions, and world has no permissions. The exceptions are the logs, temp, and work directories that are owned by the Tomcat user rather than root. This means that even if an attacker compromises the Tomcat process, they cannot change the Tomcat configuration, deploy new web applications, or modify existing web applications. The Tomcat process runs with a umask of 0027 to maintain these permissions. Note that running Tomcat in a Docker environment can impact how file permissions and user ownership settings are applied. Due to associated Docker configuration complexities, the STIG is scoped for standalone rather than virtual Docker deployments.

Satisfies: SRG-APP-000121-AS-000081, SRG-APP-000122-AS-000082, SRG-APP-000123-AS-000083, SRG-APP-000340-AS-000185

Solution

Run the following command on the Tomcat server:

sudo find $CATALINA_HOME/bin -follow -maxdepth 0 -type d -print0 | sudo xargs chmod 750 $CATALINA_HOME/bin

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apache_Tomcat_Application_Server_9_V2R7_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001493, CCI|CCI-001494, CCI|CCI-001495, CCI|CCI-002235, Rule-ID|SV-222948r879579_rule, STIG-ID|TCAT-AS-000390, STIG-Legacy|SV-111553, STIG-Legacy|V-102607, Vuln-ID|V-222948

Plugin: Unix

Control ID: 75a59602eac1e12f9567758a66afb54332e32d8aa8143cc45b4c5a772948c4dc