OH12-1X-000225 - Symbolic links must not be used in the web content directory tree.

Information

A symbolic link allows a file or a directory to be referenced using a symbolic name raising a potential hazard if symbolic linkage is made to a sensitive area. When web scripts are executed and symbolic links are allowed, the web user could be allowed to access locations on the web server that are outside the scope of the web document root or home directory.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor that contains a '<VirtualHost>' directive.

2. Search for the 'DocumentRoot' directive at the OHS server and virtual host configuration scopes.

3. Within the directory specified by each 'DocumentRoot' directive, check recursively for any symbolic links (e.g., find . -type l -exec ls -ald {} ;).

4. Remove any symbolic links found in the 'DocumentRoot' directory tree.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V1R6_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-11, CAT|I, CCI|CCI-000366, Rule-ID|SV-79177r1_rule, STIG-ID|OH12-1X-000225, Vuln-ID|V-64687

Plugin: Unix

Control ID: 2a715d5aa370073c3f9a345c388f7256b9348084fd84086d2f7b927f2c9fa103