VCST-80-000151 The vCenter STS service must disable 'ALLOW_BACKSLASH'.

Information

When Tomcat is installed behind a proxy configured to only allow access to certain contexts (web applications), an HTTP request containing '/../' may allow attackers to work around the proxy restrictions using directory traversal attack methods. If 'allow_backslash' is 'true', the '' character will be permitted as a path delimiter. The default value for the setting is 'false', but Tomcat must always be configured as if no proxy restricting context access was used, and 'allow_backslash' should be set to 'false' to prevent directory-traversal-style attacks. This setting can create operability issues with noncompliant clients.

Solution

Navigate to and open:

/usr/lib/vmware-sso/vmware-sts/conf/catalina.properties

Update or remove the following line:

org.apache.catalina.connector.ALLOW_BACKSLASH=false

Restart the service with the following command:

# vmon-cli --restart sts

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_8-0_Y24M08_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-258999r961863_rule, STIG-ID|VCST-80-000151, Vuln-ID|V-258999

Plugin: Unix

Control ID: c04579291a3f7959518e40a5ea891068002b8c9feb099d221dd9c04be17d9eb1