Information
By their very nature, CGI type files permit the anonymous web user to interact with data and perhaps store data on the web server. In many cases, CGI scripts exercise system-level control over the server's resources. These files make appealing targets for the malicious user. If these files can be modified or exploited, the web server can be compromised. CGI or equivalent files must be monitored by a security tool alerting the Web Admin of any unauthorized changes.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Configure the monitoring tool to include CGI type files or equivalent programs directory.