OH12-1X-000228 - OHS must prohibit anonymous FTP user access to interactive scripts.

Information

The directories containing the CGI scripts, such as PERL, must not be accessible to anonymous users via FTP. This applies to all directories that contain scripts that can dynamically produce web pages in an interactive manner (i.e., scripts based upon user-provided input). Such scripts contain information that could be used to compromise a web service, access system resources, or deface a web site.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Ensure that all file transfers to the server are authenticated, authorized, and secure.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-221465r961863_rule, STIG-ID|OH12-1X-000228, STIG-Legacy|SV-79183, STIG-Legacy|V-64693, Vuln-ID|V-221465

Plugin: Unix

Control ID: 8cd5cdae4c9a511917b407ab2a9d8dda0f03a650d4b0146c4f57f6017f88f894