UCF STIG Viewer Logo

Tomcat user UMASK must be set to 0027.


Overview

Finding ID Version Rule ID IA Controls Severity
V-222949 TCAT-AS-000450 SV-222949r615938_rule Medium
Description
For Unix-based systems, umask settings affect file creation permissions. If the permissions are too loose, newly created log files and applications could be accessible to unauthorized users via the file system. Ensure the Tomcat OS user account has the correct file creation permission settings by validating the OS umask settings for the Tomcat user. Setting umask to 0027 gives the Tomcat user full rights, group users r-x permission and all others no access. Tomcat will most likely be running as a systemd service. Locate the systemd service file for Tomcat. The default location for the link to the service file is in /etc/systemd/system folder. The service file name should be indicative of the Tomcat process so tomcat.service is the logical name for the service file and is the name referenced by the STIG.
STIG Date
Apache Tomcat Application Sever 9 Security Technical Implementation Guide 2021-12-27

Details

Check Text ( C-24621r426291_chk )
Reference the system documentation and make relevant changes to the following commands if the system differs:

From the Tomcat server command line run the following command:

sudo cat /etc/systemd/system/tomcat.service | grep -i umask

If the umask is not = 0027, this is a finding.
Fix Text (F-24610r426292_fix)
From the Tomcat server as a privileged user:

Use a file editor like nano or vi and edit the /etc/systemd/system/tomcat.service file.

Change the "UMask=" setting to 0027.

UMask =0027

Save the file and restart Tomcat:
sudo systemctl restart tomcat
sudo systemctl daemon-reload