I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000001-WSR-000001
<GroupDescription></GroupDescription>Group -
Lookup Service must limit the number of concurrent connections permitted.
<VulnDiscussion>Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a website, facilitating a denial...Rule Medium Severity -
SRG-APP-000001-WSR-000001
<GroupDescription></GroupDescription>Group -
Lookup Service must limit the maximum size of a POST request.
<VulnDiscussion>The "maxPostSize" value is the maximum size in bytes of the POST that will be handled by the container FORM URL parameter par...Rule Medium Severity -
SRG-APP-000001-WSR-000002
<GroupDescription></GroupDescription>Group -
Lookup Service must protect cookies from cross-site scripting (XSS).
<VulnDiscussion>Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored i...Rule Medium Severity -
SRG-APP-000016-WSR-000005
<GroupDescription></GroupDescription>Group -
Lookup Service must record user access in a format that enables monitoring of remote access.
<VulnDiscussion>Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be...Rule Medium Severity -
SRG-APP-000089-WSR-000047
<GroupDescription></GroupDescription>Group -
Lookup Service must generate log records for system startup and shutdown.
<VulnDiscussion>Logging must be started as soon as possible when a service starts and when a service is stopped. Many forms of suspicious act...Rule Medium Severity -
SRG-APP-000118-WSR-000068
<GroupDescription></GroupDescription>Group -
Lookup Service log files must only be accessible by privileged users.
<VulnDiscussion>Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and...Rule Medium Severity -
SRG-APP-000131-WSR-000051
<GroupDescription></GroupDescription>Group -
Lookup Service application files must be verified for their integrity.
<VulnDiscussion>Verifying the Lookup Service application code is unchanged from its shipping state is essential for file validation and nonre...Rule Medium Severity -
SRG-APP-000131-WSR-000073
<GroupDescription></GroupDescription>Group -
Lookup Service must only run one webapp.
<VulnDiscussion>VMware ships Lookup Service on the vCenter Server Appliance (VCSA) with one webapp. Any other path is potentially malicious a...Rule Medium Severity -
SRG-APP-000141-WSR-000015
<GroupDescription></GroupDescription>Group -
Lookup Service must not be configured with the "UserDatabaseRealm" enabled.
<VulnDiscussion>The Lookup Service performs user authentication at the application level and not through Tomcat. By default, there is no conf...Rule Medium Severity -
SRG-APP-000141-WSR-000075
<GroupDescription></GroupDescription>Group -
Lookup Service must be configured to limit access to internal packages.
<VulnDiscussion>The "package.access" entry in the "catalina.properties" file implements access control at the package level. When properly co...Rule Medium Severity -
SRG-APP-000141-WSR-000081
<GroupDescription></GroupDescription>Group -
Lookup Service must have Multipurpose Internet Mail Extensions (MIMEs) that invoke operating system shell programs disabled.
<VulnDiscussion>MIME mappings tell the Lookup Service what type of program various file types and extensions are and what external utilities ...Rule Medium Severity -
SRG-APP-000141-WSR-000083
<GroupDescription></GroupDescription>Group -
Lookup Service must have mappings set for Java servlet pages.
<VulnDiscussion>Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of fi...Rule Medium Severity -
SRG-APP-000141-WSR-000085
<GroupDescription></GroupDescription>Group -
Lookup Service must not have the Web Distributed Authoring (WebDAV) servlet installed.
<VulnDiscussion>WebDAV is an extension to the HTTP protocol that, when developed, was meant to allow users to create, change, and move docume...Rule Medium Severity -
SRG-APP-000141-WSR-000086
<GroupDescription></GroupDescription>Group -
Lookup Service must be configured with memory leak protection.
<VulnDiscussion>The Java Runtime environment can cause a memory leak or lock files under certain conditions. Without memory leak protection, ...Rule Medium Severity -
SRG-APP-000141-WSR-000087
<GroupDescription></GroupDescription>Group -
Lookup Service must not have any symbolic links in the web content directory tree.
<VulnDiscussion>A web server is designed to deliver content and execute scripts or applications on the request of a client or user. Containin...Rule Medium Severity -
SRG-APP-000211-WSR-000030
<GroupDescription></GroupDescription>Group -
Lookup Service directory tree must have permissions in an out-of-the-box state.
<VulnDiscussion>As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and...Rule Medium Severity -
SRG-APP-000225-WSR-000140
<GroupDescription></GroupDescription>Group -
Lookup Service must fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
<VulnDiscussion>Determining a safe state for failure and weighing that against a potential denial of service for users depends on what type o...Rule Medium Severity -
SRG-APP-000246-WSR-000149
<GroupDescription></GroupDescription>Group -
Lookup Service must limit the number of allowed connections.
<VulnDiscussion>Limiting the number of established connections is a basic denial-of-service protection and a best practice. Servers where the...Rule Medium Severity -
SRG-APP-000251-WSR-000157
<GroupDescription></GroupDescription>Group -
Lookup Service must set URIEncoding to UTF-8.
<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted ...Rule Medium Severity -
SRG-APP-000266-WSR-000142
<GroupDescription></GroupDescription>Group -
Lookup Service must set the welcome-file node to a default web page.
<VulnDiscussion>Enumeration techniques, such as URL parameter manipulation, rely on being able to obtain information about the web server's d...Rule Medium Severity -
SRG-APP-000266-WSR-000142
<GroupDescription></GroupDescription>Group -
The Lookup Service must not show directory listings.
<VulnDiscussion>Enumeration techniques, such as URL parameter manipulation, rely on being able to obtain information about the web server's d...Rule Medium Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
Lookup Service must be configured to hide the server version.
<VulnDiscussion>Web servers will often display error messages to client users, including enough information to aid in the debugging of the er...Rule Medium Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
Lookup Service must be configured to show error pages with minimal information.
<VulnDiscussion>Web servers will often display error messages to client users, including enough information to aid in the debugging of the er...Rule Medium Severity -
SRG-APP-000266-WSR-000160
<GroupDescription></GroupDescription>Group -
Lookup Service must not enable support for TRACE requests.
<VulnDiscussion>"TRACE" is a technique for a user to request internal information about Tomcat. This is useful during product development but...Rule Medium Severity -
SRG-APP-000266-WSR-000160
<GroupDescription></GroupDescription>Group -
Lookup Service must have the debug option turned off.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.