STIGQter STIGQter: STIG Summary: IBM WebSphere Traditional V9.x Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 23 Aug 2018:

The WebSphere Application Server must remove JREs left by web server and plug-in installers for web servers and plugins running in the DMZ.

DISA Rule

SV-95989r1_rule

Vulnerability Number

V-81275

Group Title

SRG-APP-000141-AS-000095

Rule Version

WBSP-AS-000940

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

For web servers provided with the WebSphere installation that are operating in the DMZ.

Remove the /java directory from within the plugins folder.

Check Contents

This check needs to be run on the web server operating in the DMZ.

Review system documentation.

Identify web servers operating in DMZ.

If there are no web servers configured for the DMZ, this is not applicable.

From the administrative console, select Server Types >> Web Servers.

Select each web server operating in the DMZ.

Identify the "Web server installation location".

Open a secured command shell to the web server in the DMZ.

Change directory to the web server installation location.

CD to the /plugins folder.

If a /java directory exists in the plugins folder, this is a finding.

Vulnerability Number

V-81275

Documentable

False

Rule Version

WBSP-AS-000940

Severity Override Guidance

This check needs to be run on the web server operating in the DMZ.

Review system documentation.

Identify web servers operating in DMZ.

If there are no web servers configured for the DMZ, this is not applicable.

From the administrative console, select Server Types >> Web Servers.

Select each web server operating in the DMZ.

Identify the "Web server installation location".

Open a secured command shell to the web server in the DMZ.

Change directory to the web server installation location.

CD to the /plugins folder.

If a /java directory exists in the plugins folder, this is a finding.

Check Content Reference

M

Target Key

3399

Comments