STIGQter STIGQter: STIG Summary: Apache Tomcat Application Sever 9 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

STRICT_SERVLET_COMPLIANCE must be set to true.

DISA Rule

SV-223002r615938_rule

Vulnerability Number

V-223002

Group Title

SRG-APP-000516-AS-000237

Rule Version

TCAT-AS-001660

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

From the Tomcat server as a privileged user:

Edit the /etc/systemd/system/tomcat.service file and either add or edit the org.apache.catalina.STRICT_SERVLET_COMPLIANCE setting.

Set the org.apache.catalina.STRICT_SERVLET_COMPLIANCE=true

EXAMPLE:

CATALINA_OPTS='-Dorg.apache.catalina.STRICT_SERVLET_COMPLIANCE=true'

Restart the Tomcat server:
sudo systemctl restart tomcat
sudo systemctl daemon-reload

Check Contents

If the system has an ISSM risk acceptance for operational issues that arise due to this setting, this is not a finding.

From the Tomcat server as a privileged user, run the following command:

sudo grep -i strict_servlet /etc/systemd/system/tomcat.service

If there are no results, or if the
-Dorg.apache.catalina.STRICT_SERVLET_COMPLIANCE is not set to true, this is a finding.

Vulnerability Number

V-223002

Documentable

False

Rule Version

TCAT-AS-001660

Severity Override Guidance

If the system has an ISSM risk acceptance for operational issues that arise due to this setting, this is not a finding.

From the Tomcat server as a privileged user, run the following command:

sudo grep -i strict_servlet /etc/systemd/system/tomcat.service

If there are no results, or if the
-Dorg.apache.catalina.STRICT_SERVLET_COMPLIANCE is not set to true, this is a finding.

Check Content Reference

M

Target Key

4094

Comments