OH12-1X-000231 - Remote authors or content providers must have all files scanned for viruses and malicious code before uploading files to the Document Root directory.

Information

Remote web authors should not be able to upload files to the DocumentRoot directory structure without virus checking and checking for malicious or mobile code. A remote web user whose agency has a Memorandum of Agreement (MOA) with the hosting agency and has submitted a DoD form 2875 (System Authorization Access Request (SAAR)) or an equivalent document will be allowed to post files to a temporary location on the server. All posted files to this temporary location will be scanned for viruses and content checked for malicious or mobile code. Only files free of viruses and malicious or mobile code will be posted to the appropriate Document Root directory.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Install anti-virus software on the OHS server and configure it to automatically scan for any viruses, malicious code, and mobile code.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-221468r961863_rule, STIG-ID|OH12-1X-000231, STIG-Legacy|SV-79189, STIG-Legacy|V-64699, Vuln-ID|V-221468

Plugin: Unix

Control ID: 4a4fb0874c702cc35b347a5afa867ff675e9884c12de85e4b1a9d1d207ffe46c