Check: IIST-SV-000210
Microsoft IIS 10.0 Server STIG:
IIST-SV-000210
(in versions v2 r10 through v2 r3)
Title
HTTPAPI Server version must be removed from the HTTP Response Header information. (Cat III impact)
Discussion
HTTP Response Headers contain information that could enable an attacker to gain access to an information system. Failure to prevent the sending of certain HTTP Response Header information to remote requesters exposes internal configuration information to potential attackers.
Check Content
Open Registry Editor. Navigate to “HKLM\System\CurrentControlSet\Services\HTTP\Parameters” Verify “DisableServerHeader” is set to “1”. If REG_DWORD DisableServerHeader is not set to 1, this is a finding. If the System Administrator can show that Server Version information has been removed via other means, such as using a rewrite outbound rule, this is not a finding.
Fix Text
Navigate to “HKLM\System\CurrentControlSet\Services\HTTP\Parameters”. Create REG_DWORD “DisableServerHeader” and set it to “1”. Note: This can be performed multiple ways, this is an example.
Additional Identifiers
Rule ID: SV-241788r879655_rule
Vulnerability ID: V-241788
Group Title: SRG-APP-000266-WSR-000159
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001312 |
The information system generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries. |
Controls
Number | Title |
---|---|
SI-11 |
Error Handling |