STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 PostgreSQL Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

VMware Postgres must not allow schema access to unauthorized accounts.

DISA Rule

SV-239209r717061_rule

Vulnerability Number

V-239209

Group Title

SRG-APP-000233-DB-000124

Rule Version

VCPG-67-000017

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command prompt, execute the following command:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "REVOKE ALL PRIVILEGES ON <name> FROM <user>;"

Replace <name> and <user> with the Access Privilege name and account, respectively, discovered during the check.

Check Contents

At the command prompt, execute the following command:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "\dp .*.;"/opt/vmware/vpostgres/current/bin/psql -U postgres -c "\dp .*.;"|grep -E "information_schema|pg_catalog"|awk -F '|' '{print $4}'|awk -F '/' '{print $1}'|grep -v "=r"|grep -v "postgres"|grep -v " "

If any lines are returned, this is a finding.

Vulnerability Number

V-239209

Documentable

False

Rule Version

VCPG-67-000017

Severity Override Guidance

At the command prompt, execute the following command:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "\dp .*.;"/opt/vmware/vpostgres/current/bin/psql -U postgres -c "\dp .*.;"|grep -E "information_schema|pg_catalog"|awk -F '|' '{print $4}'|awk -F '/' '{print $1}'|grep -v "=r"|grep -v "postgres"|grep -v " "

If any lines are returned, this is a finding.

Check Content Reference

M

Target Key

5324

Comments