The vAMI executable files and library must not be world-writeable.

From VMW vRealize Automation 7.x vAMI Security Technical Implementation Guide

Part of SRG-APP-000133-AS-000092

Associated with: CCI-001499

SV-100863r1_rule The vAMI executable files and library must not be world-writeable.

Vulnerability discussion

Application servers have the ability to specify that the hosted applications utilize shared libraries. The application server must have a capability to divide roles based upon duties wherein one project user (such as a developer) cannot modify the shared library code of another project user. The application server must also be able to specify that non-privileged users cannot modify any shared library code at all.

Check content

At the command prompt, execute the following command: find /opt/vmware/share/vami -perm -0002 -type f If any files are listed, this is a finding.

Fix text

At the command prompt, enter the following command: chmod a-w Note: Replace with the file(s) with world-write rights.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer