VCST-67-000023 - The Security Token Service must not show directory listings.

Information

Enumeration techniques, such as URL parameter manipulation, rely on being able to obtain information about the web server's directory structure by locating directories without default pages. In this scenario, the web server will display to the user a listing of the files in the directory being accessed. Ensuring that directory listing is disabled is one approach to mitigating the vulnerability.

Solution

Connect to the PSC, whether external or embedded.

Navigate to and open /usr/lib/vmware-sso/vmware-sts/conf/web.xml.

Set the <param-value> to 'false' in all <param-name>listing</param-name> nodes.

Note: The setting should look like the following:

<init-param>
<param-name>listings</param-name>
<param-value>false</param-value>
</init-param>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y23M07_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-11a., CAT|II, CCI|CCI-001312, Rule-ID|SV-239674r879655_rule, STIG-ID|VCST-67-000023, Vuln-ID|V-239674

Plugin: Unix

Control ID: 40486d33f9728ffc8ed51423f4dd15accf22b5bad17050ebf21f66f8e3bfd769