WA00540 W22 - The web server must be configured to explicitly deny access to the OS root.

Information

The Apache Directory directive allows for directory specific configuration of access controls and many other features and options. One important usage is to create a default deny policy that does not allow access to Operating System directories and files, except for those specifically allowed. This is done, with denying access to the OS root directory. One aspect of Apache, which is occasionally misunderstood, is the feature of default access. That is, unless you take steps to change it, if the server can find its way to a file through normal URL mapping rules, it can and will serve it to clients. Having a default deny is a predominate security principal, and then helps prevent the unintended access, and we do that in this case by denying access to the OS root directory. The Order directive is important as it provides for other Allow directives to override the default deny.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
NOTE: For every root directory entry (i.e. <Directory />) ensure the following exists after it: 'Order deny,allow' and 'Deny from all'.

Solution

Add the following after the root directory directive-

Order deny,allow
Deny from all

See Also

https://iasecontent.disa.mil/stigs/zip/U_Apache_2-2_WIN_V1R12_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, Rule-ID|SV-33180r1_rule, STIG-ID|WA00540, Vuln-ID|V-26323

Plugin: Windows

Control ID: 940fd528272fc7e6e1fa809adc851ef49042c04ec87448b8874fee3d2b0e7164