DISA STIGS Viewer

The ISEC7 SPHERE must remove any unnecessary users or groups that have permissions to the server.xml file in Apache Tomcat.

Overview

Finding ID Version Rule ID IA Controls Severity
V-224790 ISEC-06-551310 SV-224790r1013879_rule   Medium
Description
Tomcat uses a port (defaults to 8005) as a shutdown port. Someone could Telnet to the machine using this port and send the default command SHUTDOWN. Tomcat and all web apps would shut down in that case, which is a denial-of-service attack and would cause an unwanted service interruption.
STIG Date
ISEC7 Sphere Security Technical Implementation Guide 2024-08-20

Details

Check Text (C-26481r1013877_chk)
Verify unnecessary users or groups that have permissions to the Server.xml file in Apache Tomcat have been removed.

Browse to ProgramFiles\Isec7 SPHERE\Tomcat\Conf and select "Server.xml".
Right-click and select "Properties".
Select the security tab and verify no unnecessary account or groups have been granted permissions to the file.
Verify no unnecessary users or groups have permissions to the file.

If unnecessary users or groups that have permissions to the Server.xml file in Apache Tomcat have not been removed, this is a finding.
Fix Text (F-26469r1013878_fix)
Log in to the ISEC7 SPHERE server.
Browse to ProgramFiles\Isec7 SPHERE\Tomcat\Conf and select Server.xml.
Right-click and select "Properties".
Select the security tab and remove unnecessary accounts or groups that have been granted permissions to the Server.xml file.