WA00565 W22 - HTTP request methods must be limited.

Information

The HTTP 1.1 protocol supports several request methods which are rarely used and potentially high risk. For example, methods such as PUT and DELETE are rarely used and should be disabled in keeping with the primary security principal of minimize features and options. Also since the usage of these methods is typically to modify resources on the web server, they should be explicitly disallowed. For normal web server operation, you will typically need to allow only the GET, HEAD and POST request methods. This will allow for downloading of web pages and submitting information to web forms. The OPTIONS request method will also be allowed as it is used to request which HTTP request methods are allowed.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Add the following to all enabled Directory directives except root:

Order allow,deny
<LimitExcept GET POST OPTIONS>
Deny from all
</LimitExcept>

See Also

https://iasecontent.disa.mil/stigs/zip/U_Apache_2-2_WIN_V1R13_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7a., CAT|II, Rule-ID|SV-33238r2_rule, STIG-ID|WA00565_W22, Vuln-ID|V-26396

Plugin: Windows

Control ID: d9ca90bff0844739889cc742e8b88fedf3ead6e16b6240be91411ce3fd9a824d