VCST-67-000021 - The Security Token Service must use the 'setCharacterEncodingFilter' filter - setCharacterEncodingFilter filter - filter-mapping

Information

Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an application compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application.

An attacker can also enter Unicode characters into hosted applications in an effort to break out of the document home or root home directory or to bypass security checks. VMware uses the standard Tomcat 'SetCharacterEncodingFilter' to provide a layer of defense against character encoding attacks. Filters are Java objects that perform filtering tasks on the request to a resource (a servlet or static content), the response from a resource, or both.

Solution

Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml.

Configure the <web-app> node with the child nodes listed below:

<filter-mapping>
<filter-name>setCharacterEncodingFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<filter>
<filter-name>setCharacterEncodingFilter</filter-name>
<filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class>
<init-param>
<param-name>encoding</param-name>
<param-value>UTF-8</param-value>
<param-name>ignore</param-name>
<param-value>false</param-value>
</init-param>
<async-supported>true</async-supported>
</filter>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001310, Rule-ID|SV-239672r679088_rule, STIG-ID|VCST-67-000021, Vuln-ID|V-239672

Plugin: Unix

Control ID: 0ef160f20d9218b6ea844302b868f8d3dc2017cfe61c81580c0e6df1463752c2