WA130 - Scripts are not reviewed by a CCB or technical group and installation of scripts on the web server is not controlled.

Information

Vulnerability Key: V0002269
IA Controls: ECSD-1 Software Development Change Controls, ECSD-2 Software Development Change Controls
Categories: 7.4 Testing, 7.7 Code Validation, 12.4 CM Process
Severity: Category III
Ref: WEB SERVER SECURITY TECHNICAL IMPLEMENTATION GUIDE Section 4.2
Interactive scripts is a powerful means for enhancing web site functionality. Scripts are often
executable at the operating system level and frequently exercise control over fundamental system
resources (i.e start and stop programs, write data to the server, alter and delete data). A variety of
scripting languages, middleware, is available for this purpose. Typically, this middleware involves the
use of an interpreter. The opportunity for a malicious user to exploit poorly designed or untested web
scripts is significant and has proven to be a leading cause of server compromises. This would apply to
any operating system and any web server software in use. ASP, JSP, JAVA and PERL scripts are
commonly found in these circumstances.
NOTE: Nessus did not perform this check as it requires manual verification with the IAO, SA, and/or Web Manager that all scripts
are reviewed by a CCB or technical group prior to their installation on the web server.