UCF STIG Viewer Logo

HTTP request methods must be limited.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26396 WA00565 W22 SV-33238r1_rule DCSP-1 Medium
Description
The HTTP 1.1 protocol supports several request methods which are rarely used and potentially high risk. For example, methods such as PUT and DELETE are rarely used and should be disabled in keeping with the primary security principal of minimize features and options. Also since the usage of these methods is typically to modify resources on the web server, they should be explicitly disallowed. For normal web server operation, you will typically need to allow only the GET, HEAD and POST request methods. This will allow for downloading of web pages and submitting information to web forms. The OPTIONS request method will also be allowed as it is used to request which HTTP request methods are allowed.
STIG Date
APACHE SERVER 2.2 for Windows 2011-12-12

Details

Check Text ( C-33835r1_chk )
Locate the Apache httpd.conf file.

Open the httpd.conf file with an editor such as notepad, and search for the following uncommented directive: Directory

For every enabled Directory directive (except root), ensure the following entry exists:

Order allow,deny


Deny from all


If the statement above is found in the root directory statement (i.e. ), this is a finding. If the statement above is found enabled but without the appropriate LimitExcept or Order statement, this is a finding. If the statement is not found at all inside an enabled Directory directive, this is a finding.

Note: If the LimitExcept statement above is operationally limiting. This should be explicitly documented with the Web Manager, at which point this can be considered not a finding.
Fix Text (F-29501r1_fix)
Add the following to all enabled Directory directives except root:

Order allow,deny

Deny from all