No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
WA000-WWA024
Group -
The KeepAliveTimeout directive must be defined.
The number of seconds Apache will wait for a subsequent request before closing the connection. Once a request has been received, the timeout value specified by the Timeout directive applies. Settin...Rule Medium Severity -
WA000-WWA050
Group -
All interactive programs must be placed in a designated directory with appropriate permissions.
CGI scripts are one of the most exploited vulnerabilities on web servers. CGI script execution in Apache can be accomplished via two methods. The first method uses the ScriptAlias directive to te...Rule Medium Severity -
WA000-WWA052
Group -
The FollowSymLinks setting must be disabled.
The Options directive configures the web server features that are available in particular directories. The FollowSymLinks option controls the ability of the server to follow symbolic links. A symbo...Rule Medium Severity -
WA000-WWA054
Group -
Server side includes (SSIs) must run with execution capability disabled.
The Options directive configures the web server features that are available in particular directories. The IncludesNOEXEC feature controls the ability of the server to utilize SSIs while disabling...Rule High Severity -
WA000-WWA056
Group -
The MultiViews directive must be disabled.
Apache HTTPD supports content negotiation as described in the HTTP/1.1 specification. It can choose the best representation of a resource based on the browser-supplied preferences for media type, l...Rule Medium Severity -
WA000-WWA058
Group -
Directory indexing must be disabled on directories not containing index files.
Directory options directives are directives that can be applied to further restrict access to file and directories. If a URL which maps to a directory is requested, and there is no DirectoryIndex ...Rule Medium Severity -
WA000-WWA060
Group -
The HTTP request message body size must be limited.
Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a given size buffer. The eventual overflow of this buffer can overwrite s...Rule Medium Severity -
WA000-WWA062
Group -
The HTTP request header fields must be limited.
Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a given size buffer. The eventual overflow of this buffer can overwrite s...Rule Medium Severity -
WA000-WWA064
Group -
The HTTP request header field size must be limited.
Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a given size buffer. The eventual overflow of this buffer can overwrite s...Rule Medium Severity -
WA000-WWA066
Group -
The HTTP request line must be limited.
Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a given size buffer. The eventual overflow of this buffer can overwrite s...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.