AS24-W1-000580 - The Apache web server document directory must be in a separate partition from the Apache web servers system files.

Information

A web server is used to deliver content on the request of a client. The content delivered to a client must be controlled, allowing only hosted application files to be accessed and delivered. To allow a client access to system files of any type is a major security risk that is entirely avoidable. Obtaining such access is the goal of directory traversal and URL manipulation vulnerabilities. To facilitate such access by misconfiguring the web document (home) directory is a serious error. In addition, having the path on the same drive as the system folder compounds potential attacks such as drive space exhaustion.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the public web server to not have a trusted relationship with any system resource that is also not accessible to the public. Web content is not to be shared via Microsoft shares or NFS mounts.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apache_Server_2-4_Windows_Y23M01_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-3, CAT|II, CCI|CCI-001084, Rule-ID|SV-214337r879643_rule, STIG-ID|AS24-W1-000580, STIG-Legacy|SV-102513, STIG-Legacy|V-92425, Vuln-ID|V-214337

Plugin: Windows

Control ID: 7b1f5c0d5da20084b5cace2225b08197e706341806db8a2d97e2d4d4c0c710e4