1. Home
  2. Security Hardening
  3. DISA STIG Apache Site 2.2 Unix V1R11
  4. WG430 A22 – Anonymous FTP user access to interactive scripts is prohibited.

WG430 A22 – Anonymous FTP user access to interactive scripts is prohibited.

Details

The directories containing the CGI scripts, such as PERL, must not be accessible to anonymous users via FTP. This applies to all directories that contain scripts that can dynamically produce web pages in an interactive manner (i.e., scripts based upon user-provided input). Such scripts contain information that could be used to compromise a web service, access system resources, or deface a web site.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

If the CGI, the cgi-bin, or the cgi-shl directories can be accessed via FTP by any group or user that does not require access, remove permissions to such directories for all but the web administrators and the SAs. Ensure that any such access employs an encrypted connection.

Supportive Information

The following resource is also helpful.

This control applies to the following type of system Unix.

References

  • CAT|II
  • Rule-ID|SV-36641r1_rule
  • STIG-ID|WG430_A22
  • Vuln-ID|V-2270

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles