WG410 - Interactive scripts do not have proper access controls. - 'Virtual Directories - AspScriptTimeout set to 90 or less'

Information

Vulnerability Key: V0002229
IA Controls: ECLP-1 Least Privilege
Categories: 2.2 Least Privilege
Severity: Category II
Ref: WEB SERVER SECURITY TECHNICAL IMPLEMENTATION GUIDE Section 4.2, Web Site Administration Policies & Procedures,
With Amendments and Corrections incorporated in red italics
CGI scripts represents one of the most common and exploitable means of compromising a web server.
By definition, CGI are executable by the operating system of the host server. While access control is
provided via the web service, the execution of CGI programs is not otherwise limited unless the SA or
Web Manager take specific measures. CGI programs can access and alter data files, launch other
programs and use the network. CGI programs can be written in any available programming language.
C, PERL, PHP, Javascript, VBScript and shell (sh, ksh, bash) are popular choices. CGI is a standard
for interfacing external applications with information servers, such as HTTP or web servers. The
definition of CGI as web-based applications is not to be confused with the more specific .cgi file
extension. ASP, JSP, JAVA and PERL scripts are commonly found in these circumstances.
NOTE: Manual verification is required in order to determine if the system's Application Setting 'Execute Permission' is set to 'Scrip Only'.

Item Details

Category: ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-12, 800-53|SC-5, CSCv6|16.4

Plugin: Windows

Control ID: dcf97f1227ac532f2ca6c2db394713e62f4c8d29e44b7b8b93096e2c1da5325e