Check: WA00510 W22
APACHE 2.2 Server for Windows STIG:
WA00510 W22
(in versions v1 r13 through v1 r11)
Title
Web server status module must be disabled. (Cat II impact)
Discussion
The Apache mod_info module provides information on the server configuration via access to a /server-info URL location, while the mod_status module provides current server performance statistics. While having server configuration and status information available as a web page may be convenient, it is recommended that these modules not be enabled: Once mod_info is loaded into the server, its handler capability is available in per-directory .htaccess files and can leak sensitive information from the configuration directives of other Apache modules such as system paths, usernames/passwords, database names, etc. If mod_status is loaded into the server, its handler capability is available in all configuration files, including per-directory files (e.g., .htaccess) and may have security-related ramifications.
Check Content
Open a command prompt window. Navigate to the “bin” directory (in many cases this may be [Drive Letter]:\[directory path]\Apache Software Foundation\Apache2.2\bin>). Enter the following command: httpd –M <enter> NOTE: Some installations may be running under apache.exe. In such case, validate by running the following command: apache -M <enter> This will provide a list of all loaded modules. If any of the following modules are found this is a finding: info_module & status_module.
Fix Text
Disable info and status modules by adding a "#" in front of them within the httpd.conf file, and restarting the Apache service.
Additional Identifiers
Rule ID: SV-33171r2_rule
Vulnerability ID: V-26294
Group Title: WA00510
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |