Details
A web server is designed to deliver content and execute scripts or applications on the request of a client or user. Containing user requests to files in the directory tree of the hosted web application and limiting the execution of scripts and applications guarantees that the user is not accessing information protected outside the application’s realm.
The web server must also prohibit users from jumping outside the hosted application directory tree through access to the user’s home directory, symbolic links or shortcuts, or through search paths for missing files.
Solution
Determine the location of the ‘HTTPD_ROOT’ directory and the ‘httpd.conf’ file:
# httpd -V | egrep -i ‘httpd_root|server_config_file’
-D HTTPD_ROOT=’/etc/httpd’
-D SERVER_CONFIG_FILE=’conf/httpd.conf’
Set the root directory directive as follows:
…
Require all denied
…
Remove any ‘Deny’ and ‘Allow’ directives from the root
Restart Apache: apachectl restart
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.
References
- 800-53|CM-7a.
- CAT|II
- CCI|CCI-000381
- Rule-ID|SV-214284r612241_rule
- STIG-ID|AS24-U2-000350
- STIG-Legacy|SV-102867
- STIG-Legacy|V-92779
- Vuln-ID|V-214284