UCF STIG Viewer Logo

Monitoring software will include CGI or equivalent programs in the set of files which it checks.


Overview

Finding ID Version Rule ID IA Controls Severity
V-2271 WG440 SV-2271r1_rule Medium
Description
By their very nature, CGI type files permit the anonymous web user to interact with data and perhaps store data on the web server. In many cases, CGI scripts exercise system-level control over the server’s resources. These files make appealing targets for the malicious user. If these files can be modified or exploited, the web server can be compromised. These files must be monitored by a security tool that reports unauthorized changes to these files.
STIG Date
IIS 7.0 Server STIG 2019-03-22

Details

Check Text ( C-29982r1_chk )
CGI or equivalent files must be monitored by a security tool that reports unauthorized changes. It is the purpose of such software to monitor key files for unauthorized changes to them.

The reviewer should query the IAO, the SA, and the web administrator and verify the information provided by asking to see the template file or configuration file of the software being used to accomplish this security task.

Example file extensions for files considered to provide active content are, but not limited to, .cgi, .asp, .aspx, .class, .vb, .php, .pl, and .c.

If the site does not have a process in place to monitor changes to CGI program files, this is a finding.
Fix Text (F-26839r1_fix)
Configure the monitoring tool to include CGI type files or equivalent programs directory.