UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Unlisted file extensions in URL requests must be filtered by any IIS 8.5 website.


Overview

Finding ID Version Rule ID IA Controls Severity
V-214469 IISW-SI-000230 SV-214469r695293_rule Medium
Description
Request filtering enables administrators to create a more granular rule set to allow or reject inbound web content. By setting limits on web requests it helps to ensure availability of web services and may also help mitigate the risk of buffer overflow type attacks. The allow unlisted property of the “File Extensions Request” filter enables rejection of requests containing specific file extensions not defined in the “File Extensions” filter. Tripping this filter will cause IIS to generate a Status Code 404.7.
STIG Date
Microsoft IIS 8.5 Site Security Technical Implementation Guide 2022-06-17

Details

Check Text ( C-15678r695292_chk )
Follow the procedures below for each site hosted on the IIS 8.5 web server:

Open the IIS 8.5 Manager.

Click on the site name.

Double-click the "Request Filtering" icon.

Click “Edit Feature Settings” in the "Actions" pane.

If "Allow unlisted file name extensions" check box is checked, this is a finding.

Note: If this IIS 8.5 installation is supporting Microsoft Exchange, and not otherwise hosting any content, this requirement is Not Applicable.

Note: If this IIS 8.5 installation is supporting Splunk, this requirement is Not Applicable.
Fix Text (F-15676r310612_fix)
Follow the procedures below for each site hosted on the IIS 8.5 web server:

Open the IIS 8.5 Manager.

Click the site name under review.

Double-click the "Request Filtering" icon.

Click “Edit Feature Settings” in the "Actions" pane.

Uncheck the "Allow unlisted file extensions" check box.