STIGQter STIGQter: STIG Summary: Oracle HTTP Server 12.1.3 Security Technical Implementation Guide Version: 1 Release: 7 Benchmark Date: 24 Jul 2020:

OHS must be configured to use a specified IP address, port, and protocol.

DISA Rule

SV-78895r1_rule

Vulnerability Number

V-64405

Group Title

SRG-APP-000142-WSR-000089

Rule Version

OH12-1X-000173

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/ssl.conf with an editor.

2. Search for a "Listen" directive at the OHS server configuration scope.

3. Set the "Listen" directive to a value containing an IP address, port, and protocol (e.g., "Listen 123.123.123.123:80 http" or "Listen 456.456.456.456:443 https").

Check Contents

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/ssl.conf with an editor.

2. Search for a "Listen" directive at the OHS server configuration scope.

3. If the directive is set without an IP address, port, and protocol specified, this is a finding.

Vulnerability Number

V-64405

Documentable

False

Rule Version

OH12-1X-000173

Severity Override Guidance

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/ssl.conf with an editor.

2. Search for a "Listen" directive at the OHS server configuration scope.

3. If the directive is set without an IP address, port, and protocol specified, this is a finding.

Check Content Reference

M

Target Key

2753

Comments