UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The web server must allow the mappings to unused and vulnerable scripts to be removed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-41700 SRG-APP-000141-WSR-000082 SV-54277r2_rule Medium
Description
Scripts allow server side processing on behalf of the hosted application user or as processes needed in the implementation of hosted applications. Removing scripts not needed for application operation or deemed vulnerable helps to secure the web server. To assure scripts are not added to the web server and run maliciously, those script mappings that are not needed or used by the web server for hosted application operation must be removed.
STIG Date
Web Server Security Requirements Guide 2014-11-17

Details

Check Text ( C-48097r2_chk )
Review the web server documentation and deployment configuration to determine what script mappings are available.

Review the scripts used by the web server and the hosted applications.

If there are script mappings in use that are not used by the web server or hosted applications for operation, this is a finding.
Fix Text (F-47159r2_fix)
Remove script mappings that are not needed for web server and hosted application operation.