STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide

V-256769

CAT II (Medium)

The Security Token Service must not enable support for TRACE requests.

Rule ID

SV-256769r889277_rule

STIG

VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001312

Discussion

"TRACE" is a technique for a user to request internal information about Tomcat. This is useful during product development but should not be enabled in production. Allowing an attacker to conduct a TRACE operation against the Security Token Service will expose information that would be useful to perform a more targeted attack. The Security Token Service provides the "allowTrace" parameter as means to disable responding to TRACE requests.

Check Content

At the command prompt, run the following command: 
 
# grep allowTrace /usr/lib/vmware-sso/vmware-sts/conf/server.xml 
 
If "allowTrace" is set to "true", this is a finding. 
 
If no line is returned, this is not a finding.

Fix Text

Navigate to and open: 
 
/usr/lib/vmware-sso/vmware-sts/conf/server.xml 
 
Locate and remove the 'allowTrace="true"' setting. 
 
Restart the service with the following command: 
 
# vmon-cli --restart sts