STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 Perfcharts Tomcat Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

Performance Charts must protect cookies from cross-site scripting (XSS).

DISA Rule

SV-239405r674938_rule

Vulnerability Number

V-239405

Group Title

SRG-APP-000001-WSR-000002

Rule Version

VCPF-67-000004

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Navigate to and open /usr/lib/vmware-perfcharts/tc-instance/webapps/statsreport/WEB-INF/web.xml.

Navigate to the <session-config> node and configure it as follows:

<session-config>
     <cookie-config>
        <http-only>true</http-only>
        <secure>true</secure>
     </cookie-config>
     <session-timeout>30</session-timeout>
  </session-config>

Check Contents

At the command prompt, execute the following command:

# xmllint --format /usr/lib/vmware-perfcharts/tc-instance/webapps/statsreport/WEB-INF/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/http-only' -

Expected result:

<http-only>true</http-only>

If the output does not match the expected result, this is a finding.

Vulnerability Number

V-239405

Documentable

False

Rule Version

VCPF-67-000004

Severity Override Guidance

At the command prompt, execute the following command:

# xmllint --format /usr/lib/vmware-perfcharts/tc-instance/webapps/statsreport/WEB-INF/web.xml | sed '2 s/xmlns=".*"//g' | xmllint --xpath '/web-app/session-config/cookie-config/http-only' -

Expected result:

<http-only>true</http-only>

If the output does not match the expected result, this is a finding.

Check Content Reference

M

Target Key

5329

Comments