OH12-1X-000172 - Users and scripts running on behalf of users must be contained to the document root or home directory tree of OHS.

Information

A web server is designed to deliver content and execute scripts or applications on the request of a client or user. Containing user requests to files in the directory tree of the hosted web application and limiting the execution of scripts and applications guarantees that the user is not accessing information protected outside the application's realm.

The web server must also prohibit users from jumping outside the hosted application directory tree through access to the user's home directory, symbolic links or shortcuts, or through search paths for missing files.

Solution

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor.

2. Search for the '<Directory>' directive at OHS server and virtual host configuration scopes.

3. Set the 'Options' directive within the '<Directory>' directive to 'None', add the directive if it does not exist.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7a., CAT|II, CCI|CCI-000381, Rule-ID|SV-221414r879587_rule, STIG-ID|OH12-1X-000172, STIG-Legacy|SV-78893, STIG-Legacy|V-64403, Vuln-ID|V-221414

Plugin: Unix

Control ID: 6f40f8f6b5727b35044db9b74cc354812e93fb59f9e909d0a907590e11802566