STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 VAMI-lighttpd Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

VAMI must only load allowed server modules.

DISA Rule

SV-239724r679282_rule

Vulnerability Number

V-239724

Group Title

SRG-APP-000141-WSR-000075

Rule Version

VCLD-67-000016

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf.

Configure the "server.modules" section to the following:

server.modules = (
"mod_access",
"mod_accesslog",
"mod_proxy",
"mod_cgi",
"mod_rewrite",
)
server.modules += ( "mod_magnet" )

Check Contents

At the command prompt, execute the following command:

# /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/server\.modules/,/\)/'

Expected result:

server.modules = (
"mod_access",
"mod_accesslog",
"mod_proxy",
"mod_cgi",
"mod_rewrite",
"mod_magnet",
"mod_setenv",
# 7
)

If the output does not match the expected result, this is a finding.

Vulnerability Number

V-239724

Documentable

False

Rule Version

VCLD-67-000016

Severity Override Guidance

At the command prompt, execute the following command:

# /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|awk '/server\.modules/,/\)/'

Expected result:

server.modules = (
"mod_access",
"mod_accesslog",
"mod_proxy",
"mod_cgi",
"mod_rewrite",
"mod_magnet",
"mod_setenv",
# 7
)

If the output does not match the expected result, this is a finding.

Check Content Reference

M

Target Key

5335

Comments