UCF STIG Viewer Logo

Backup interactive scripts on the IIS 8.5 server must be removed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-76889 IISW-SI-000263 SV-91585r1_rule Medium
Description
Copies of backup files will not execute on the server, but they can be read by the anonymous user if special precautions are not taken. Such backup copies contain the same sensitive information as the actual script being executed and, as such, are useful to malicious users. Techniques and systems exist today to search web servers for such files and are able to exploit the information contained in them.
STIG Date
IIS 8.5 Site Security Technical Implementation Guide 2020-06-05

Details

Check Text ( C-76545r1_chk )
Determine whether scripts are used on the web server for the subject website. Common file extensions include, but are not limited to: .cgi, .pl, .vb, .class, .c, .php, .asp, and .aspx.

If the website does not utilize CGI, this finding is Not Applicable.

Open the IIS 8.5 Manager.

Right-click the IIS 8.5 web site name and select “Explore”.

Search for the listed script extensions

Search for the following files: *.bak, *.old, *.temp, *.tmp, *.backup, or “copy of...”.

If files with these extensions are found, this is a finding.
Fix Text (F-83585r1_fix)
Remove the backup files from the production web server.