Check: WG290 A24
Apache Site 2.4 Unix:
WG290 A24
(in version v1 r1)
Title
Web client access to the content directories must be restricted to read and execute. (Cat I impact)
Discussion
Excessive permissions for the anonymous web user account are one of the most common faults contributing to the compromise of a web server. If this user is able to upload and execute files on the web server, the organization or owner of the server will no longer have control of the asset.
Check Content
To view the value of Alias enter the following command: find / -name httpd.conf -print -exec grep -H -i "Alias" {} \; Alias ScriptAlias ScriptAliasMatch Review the results to determine the location of the files listed above. Enter the following command to determine the permissions of the above file: ls -Ll <file-path> The only accounts listed should be the web administrator, developers, and the account assigned to run the apache server service. If accounts that don’t need access to these directories are listed, this is a finding. If the permissions assigned to the account for the Apache web server service is greater than Read & Execute (R_E), this is a finding.
Fix Text
Assign the appropriate permissions to the applicable directories and files using the chmod command.
Additional Identifiers
Rule ID:
Vulnerability ID: V-2258
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |