OH12-1X-000234 - OHS must not have the directive PlsqlDatabasePassword set in clear text.

Information

OHS supports the use of the module mod_plsql, which allows applications to be hosted that are PL/SQL-based. To access the database, the module must have a valid username, password and database name. To keep the password from an attacker, the password must not be stored in plain text, but instead, obfuscated.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

1. At shell prompt, set 'ORACLE_HOME' environment variable to $ORACLE_HOME location and export the variable.

2. At shell prompt, set 'PATH' environment variable to '$ORACLE_HOME/ohs/bin:$ORACLE_HOME/bin:$ORACLE_HOME/perl/bin:$PATH' and export the variable.

3a. If AIX OS, at shell prompt, set 'LIBPATH' environment variable to '$ORACLE_HOME/lib:$LIBPATH' and export the variable.
3b. If HP-UX OS, at shell prompt, set 'SHLIB_PATH' environment variable to '$ORACLE_HOME/lib:$SHLIB_PATH' and export the variable.
3c. If Solaris OS, at shell prompt, set 'LD_LIBRARY_PATH' environment variable to '$ORACLE_HOME/lib32:$LD_LIBRARY_PATH' and export the variable.
3d. If Linux or Other Unix OS, at shell prompt, set 'LD_LIBRARY_PATH' environment variable to '$ORACLE_HOME/lib:$LD_LIBRARY_PATH' and export the variable.

4. Change the present working directory to '$ORACLE_HOME/ohs/bin' (e.g., cd $ORACLE_HOME/ohs/bin).

5. For each .conf file found to be at fault, execute dadTool.pl script (e.g., 'perl dadTool.pl -f $DOMAIN_HOME/config/fmwconfig/compoennts/OHS/<componentName>/mod_plsql/dads.conf').

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-221471r879887_rule, STIG-ID|OH12-1X-000234, STIG-Legacy|SV-79111, STIG-Legacy|V-64621, Vuln-ID|V-221471

Plugin: Unix

Control ID: 7e16e1035b80b000ae076947370252ada8ebf9281fbb0708dabc178256a4dd55