Check: IIST-SI-000263
Microsoft IIS 10.0 Site STIG:
IIST-SI-000263
(in versions v2 r9 through v1 r1)
Title
Backup interactive scripts on the IIS 10.0 server must be removed. (Cat II impact)
Discussion
Copies of backup files will not execute on the server, but they can be read by the anonymous user if special precautions are not taken. Such backup copies contain the same sensitive information as the actual script being executed and, as such, are useful to malicious users. Techniques and systems exist today to search web servers for such files and are able to exploit the information contained in them.
Check Content
Determine whether scripts are used on the web server for the subject website. Common file extensions include, but are not limited to: .cgi, .pl, .vb, .class, .c, .php, .asp, and .aspx. The scope of this requirement is to analyze only within the web server content directories, not the entire underlying operating system. If the website does not utilize CGI, this finding is Not Applicable. Open the IIS 10.0 Manager. Right-click the IIS 10.0 web site name and select "Explore". Search for the listed script extensions Search for the following files: *.bak, *.old, *.temp, *.tmp, *.backup, or “copy of...”. If files with these extensions are found, this is a finding.
Fix Text
Remove the backup files from the production web server.
Additional Identifiers
Rule ID: SV-218781r879587_rule
Vulnerability ID: V-218781
Group Title: SRG-APP-000141-WSR-000087
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
Configure the system to provide only organization-defined mission essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |