WG410 IIS6 - Interactive scripts must have proper access controls. - 'Execute Permissions set 'Script only'

Information

CGI is a 'programming standard' for interfacing external applications with information servers, such as HTTP or web servers. CGI, represented by all upper case letters, should not be confused with the .cgi file extension. The .cgi file extension does represent a CGI script, but CGI scripts may be written in a number of programming languages (e.g., PERL, C, PHP, and Javascript), each having their own unique file extension.

The use of CGI scripts represent one of the most common and exploitable means of compromising a web server. By definition, CGI scripts are executable by the operating system of the host server. While access control is provided via the web service, the execution of CGI programs is not limited unless the SA or the Web Manager takes specific measures. CGI programs can access and alter data files, launch other programs, and use the network.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

1. Set the ownership of the CGI scripts to system, the service account running the web service, the web author, and/or the SA.
2. Set the CGI script permissions for the anonymous web user account to Read or Read/Execute.
3. Set the Application settings sections Execute permissions to Scripts only.
4. Uncheck the Enable parent paths check box.

See Also

http://iasecontent.disa.mil/stigs/zip/July2015/U_IIS_6-0_V6R16_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-28848r1_rule, STIG-ID|WG410_IIS6, Vuln-ID|V-2229

Plugin: Windows

Control ID: bef74c63fef97e8b261802c812f600ed67d0aed890be6f5a530e29b2cdf9e49f