The Apache web server must allow the mappings to unused and vulnerable scripts to be removed.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-214324AS24-W1-000310SV-214324r960963_ruleCCI-000381medium
Description
Scripts allow server-side processing on behalf of the hosted application user or as processes needed in the implementation of hosted applications. Removing scripts not needed for application operation or deemed vulnerable helps to secure the web server. To ensure scripts are not added to the web server and run maliciously, script mappings that are not needed or used by the web server for hosted application operation must be removed.
STIGDate
Apache Server 2.4 Windows Server Security Technical Implementation Guide2025-02-12

Details

Check Text (C-214324r960963_chk)

Review the <'INSTALL PATH'>\conf\httpd.conf file. Locate cgi-bin files and directories enabled in the "Script", "ScriptAlias" or "ScriptAliasMatch", or "ScriptInterpreterSource" directives. If any script is not needed for application operation, this is a finding.

Fix Text (F-15534r277476_fix)

Remove any scripts in cgi-bin directory if they are not needed for application operation.