SV-78963r1_rule
V-64473
SRG-APP-000246-WSR-000149
OH12-1X-000292
CAT II
10
1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor.
2. Search for the "LimitXMLRequestBody" directive at the OHS server and virtual host configuration scopes.
3. Set the "LimitXMLRequestBody" directive to a value of "10240", add the directive if it does not exist.
Note: This vulnerability can be documented locally with the ISSM/ISSO if the site has operational reasons for the use of a higher value.
1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor.
2. Search for the "LimitXMLRequestBody" directive at the OHS server and virtual host configuration scopes.
3. If the directive is omitted or is set greater than 10240, this is a finding.
Note: This vulnerability can be documented locally with the ISSM/ISSO if the site has operational reasons for the use of a higher value.
V-64473
False
OH12-1X-000292
1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor.
2. Search for the "LimitXMLRequestBody" directive at the OHS server and virtual host configuration scopes.
3. If the directive is omitted or is set greater than 10240, this is a finding.
Note: This vulnerability can be documented locally with the ISSM/ISSO if the site has operational reasons for the use of a higher value.
M
2753