STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide

V-256756

CAT II (Medium)

The Security Token Service must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.

Rule ID

SV-256756r889238_rule

STIG

VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000381

Discussion

MIME mappings tell the Security Token Service what type of program various file types and extensions are and what external utilities or programs are needed to execute the file type. By ensuring various shell script MIME types are not included in "web.xml", the server is protected against malicious users tricking the server into executing shell command files.

Check Content

At the command prompt, run the following command: 
 
# grep -En '(x-csh<)|(x-sh<)|(x-shar<)|(x-ksh<)' /usr/lib/vmware-sso/vmware-sts/conf/web.xml 
 
If the command produces any output, this is a finding.

Fix Text

Navigate to and open: 
 
/usr/lib/vmware-sso/vmware-sts/conf/web.xml 
 
Remove all of the following nodes lines: 
 
<mime-type>application/x-csh</mime-type> 
<mime-type>application/x-shar</mime-type> 
<mime-type>application/x-sh</mime-type> 
<mime-type>application/x-ksh</mime-type> 
 
Restart the service with the following command: 
 
# vmon-cli --restart sts 
 
Note: Delete the entire mime-mapping node for the target mime-type. 
 
Example: 
 
<mime-mapping> 
    <extension>sh</extension> 
    <mime-type>application/x-sh</mime-type> 
</mime-mapping>