AS24-W1-000280 - Apache web server application directories, libraries, and configuration files must only be accessible to privileged users.

Information

When accounts used for web server features such as documentation, sample code, example applications, tutorials, utilities, and services are created even though the feature is not installed, they become an exploitable threat to a web server.

These accounts become inactive, are not monitored through regular use, and passwords for the accounts are not created or updated. An attacker, through very little effort, can use these accounts to gain access to the web server and begin investigating ways to elevate the account privileges.

The accounts used for web server features not installed must not be created and must be deleted when these features are uninstalled.

Satisfies: SRG-APP-000141-WSR-000078, SRG-APP-000211-WSR-000031, SRG-APP-000380-WSR-000072

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apache_Server_2-4_Windows_Y24M07_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CM-5(1), 800-53|CM-7a., 800-53|SC-2, CAT|I, CCI|CCI-000381, CCI|CCI-001082, CCI|CCI-001813, Rule-ID|SV-214322r960963_rule, STIG-ID|AS24-W1-000280, STIG-Legacy|SV-102465, STIG-Legacy|V-92377, Vuln-ID|V-214322

Plugin: Windows

Control ID: 61e352fa224a7893d3e92771a48ebc70ba46d6a4a90a89e31f0fc75bec7ce3c3