UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Apache web server must allow mappings to unused and vulnerable scripts to be removed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-214282 AS24-U2-000310 SV-214282r612241_rule Medium
Description
Scripts allow server-side processing on behalf of the hosted application user or as processes needed in the implementation of hosted applications. Removing scripts not needed for application operation or deemed vulnerable helps to secure the web server. To ensure scripts are not added to the web server and run maliciously, script mappings that are not needed or used by the web server for hosted application operation must be removed.
STIG Date
Apache Server 2.4 UNIX Site Security Technical Implementation Guide 2021-12-17

Details

Check Text ( C-15495r277187_chk )
Determine the location of the "HTTPD_ROOT" directory and the "httpd.conf" file:

# httpd -V | egrep -i 'httpd_root|server_config_file'
-D HTTPD_ROOT="/etc/httpd"
-D SERVER_CONFIG_FILE="conf/httpd.conf"

Review "Script", "ScriptAlias" or "ScriptAliasMatch", or "ScriptInterpreterSource" directives.

Go into each directory and locate "cgi-bin" files.

If any scripts are present that are not needed for application operation, this is a finding.

If this is not documented and approved by the Information System Security Officer (ISSO), this is a finding.
Fix Text (F-15493r277188_fix)
Determine the location of the "HTTPD_ROOT" directory and the "httpd.conf" file:

# httpd -V | egrep -i 'httpd_root|server_config_file'
-D HTTPD_ROOT="/etc/httpd"
-D SERVER_CONFIG_FILE="conf/httpd.conf"

Remove any scripts in "cgi-bin" directory if they are not needed for application operation.

Ensure this process is documented and approved by the ISSO.