Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-64687 | OH12-1X-000225 | SV-79177r1_rule | High |
Description |
---|
A symbolic link allows a file or a directory to be referenced using a symbolic name raising a potential hazard if symbolic linkage is made to a sensitive area. When web scripts are executed and symbolic links are allowed, the web user could be allowed to access locations on the web server that are outside the scope of the web document root or home directory. |
STIG | Date |
---|---|
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide | 2019-12-12 |
Check Text ( C-65429r1_chk ) |
---|
1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/ 2. Search for the "DocumentRoot" directive at the OHS server and virtual host configuration scopes. 3. Within the directory specified by each "DocumentRoot" directive, check recursively for any symbolic links (e.g., find . -type l -exec ls -ald {} \;). 4. If any symbolic links are found, this is a finding. |
Fix Text (F-70617r1_fix) |
---|
1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/ 2. Search for the "DocumentRoot" directive at the OHS server and virtual host configuration scopes. 3. Within the directory specified by each "DocumentRoot" directive, check recursively for any symbolic links (e.g., find . -type l -exec ls -ald {} \;). 4. Remove any symbolic links found in the "DocumentRoot" directory tree. |