Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-17745 | DTOO164 | SV-53357r1_rule | ECSC-1 | Medium |
Description |
---|
Malicious users can create InfoPath forms with embedded Web beacons that can be used to contact an external server when the user opens the form. Information could be gathered by the form, or information entered by users could be sent to an external server and cause them to be vulnerable to additional attacks. By default, InfoPath warns users about potential Web beaconing threats. |
STIG | Date |
---|---|
Microsoft InfoPath 2013 STIG | 2015-06-18 |
Check Text ( C-47620r1_chk ) |
---|
The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Beaconing UI for forms opened in InfoPath" must be set to "Enabled (Always show beaconing UI)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value InfoPathBeaconingUI is REG_DWORD = 1, this is not a finding. |
Fix Text (F-46284r1_fix) |
---|
Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Beaconing UI for forms opened in InfoPath" to "Enabled (Always show beaconing UI)". |