STIGQter STIGQter: STIG Summary: JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

JBoss application and management ports must be approved by the PPSM CAL.

DISA Rule

SV-213525r615939_rule

Vulnerability Number

V-213525

Group Title

SRG-APP-000142-AS-000014

Rule Version

JBOS-AS-000255

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open the EAP web console by pointing a web browser to HTTPS://<Servername>:9990

Log on to the admin console using admin credentials
Select the "Configuration" tab
Expand the "General Configuration" sub system by clicking on the +
Select "Socket Binding"
Select the "View" option next to "standard-sockets"
Select "Inbound"

Select the port that needs to be reconfigured and select "Edit".

Check Contents

Open the EAP web console by pointing a web browser to HTTPS://<Servername>:9443 or HTTP://<Servername>:9990

Log on to the admin console using admin credentials
Select the "Configuration" tab
Expand the "General Configuration" sub system by clicking on the +
Select "Socket Binding"
Select the "View" option next to "standard-sockets"
Select "Inbound"

Review the configured ports and determine if they are all approved by the PPSM CAL.

If all the ports are not approved by the PPSM CAL, this is a finding.

Vulnerability Number

V-213525

Documentable

False

Rule Version

JBOS-AS-000255

Severity Override Guidance

Open the EAP web console by pointing a web browser to HTTPS://<Servername>:9443 or HTTP://<Servername>:9990

Log on to the admin console using admin credentials
Select the "Configuration" tab
Expand the "General Configuration" sub system by clicking on the +
Select "Socket Binding"
Select the "View" option next to "standard-sockets"
Select "Inbound"

Review the configured ports and determine if they are all approved by the PPSM CAL.

If all the ports are not approved by the PPSM CAL, this is a finding.

Check Content Reference

M

Target Key

3987

Comments