III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
WA000-WWA024
<GroupDescription></GroupDescription>Group -
The KeepAliveTimeout directive must be defined.
<VulnDiscussion>The number of seconds Apache will wait for a subsequent request before closing the connection. Once a request has been receiv...Rule Medium Severity -
WA000-WWA050
<GroupDescription></GroupDescription>Group -
All interactive programs must be placed in a designated directory with appropriate permissions.
<VulnDiscussion>CGI scripts are one of the most exploited vulnerabilities on web servers. CGI script execution in Apache can be accomplished...Rule Medium Severity -
WA000-WWA052
<GroupDescription></GroupDescription>Group -
The FollowSymLinks setting must be disabled.
<VulnDiscussion>The Options directive configures the web server features that are available in particular directories. The FollowSymLinks opt...Rule Medium Severity -
WA000-WWA054
<GroupDescription></GroupDescription>Group -
Server side includes (SSIs) must run with execution capability disabled.
<VulnDiscussion>The Options directive configures the web server features that are available in particular directories. The IncludesNOEXEC fe...Rule High Severity -
WA000-WWA056
<GroupDescription></GroupDescription>Group -
The MultiViews directive must be disabled.
<VulnDiscussion>Apache HTTPD supports content negotiation as described in the HTTP/1.1 specification. It can choose the best representation o...Rule Medium Severity -
WA000-WWA058
<GroupDescription></GroupDescription>Group -
Directory indexing must be disabled on directories not containing index files.
<VulnDiscussion>Directory options directives are directives that can be applied to further restrict access to file and directories. If a URL...Rule Medium Severity -
WA000-WWA060
<GroupDescription></GroupDescription>Group -
The HTTP request message body size must be limited.
<VulnDiscussion>Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...Rule Medium Severity -
WA000-WWA062
<GroupDescription></GroupDescription>Group -
The HTTP request header fields must be limited.
<VulnDiscussion>Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...Rule Medium Severity -
WA000-WWA064
<GroupDescription></GroupDescription>Group -
The HTTP request header field size must be limited.
<VulnDiscussion>Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...Rule Medium Severity -
WA000-WWA066
<GroupDescription></GroupDescription>Group -
The HTTP request line must be limited.
<VulnDiscussion>Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.