VCLU-80-000070 The vCenter Lookup service must set an inactive timeout for sessions.

Information

Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By closing sessions after a set period of inactivity, the web server can make certain that those sessions that are not closed through the user logging out of an application are eventually closed.

Satisfies: SRG-APP-000295-AS-000263, SRG-APP-000389-AS-000253

Solution

Navigate to and open:

/usr/lib/vmware-lookupsvc/conf/web.xml

Navigate to the <session-config> node and configure the <session-timeout> as follows:

<session-config>
<session-timeout>30</session-timeout>
<cookie-config>
<http-only>true</http-only>
<secure>true</secure>
</cookie-config>
</session-config>

Restart the service with the following command:

# vmon-cli --restart lookupsvc

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_8-0_Y24M08_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-12, CAT|II, CCI|CCI-002361, CCI|CCI-004895, Rule-ID|SV-259049r1003620_rule, STIG-ID|VCLU-80-000070, Vuln-ID|V-259049

Plugin: Unix

Control ID: f15d1f61ff775c4302233d89c57c6dab65455a46c0f22f8f9d57a5fa5b336136