Apache web server application directories, libraries, and configuration files must only be accessible to privileged users.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
highV-214322SRG-APP-000141-WSR-000078AS24-W1-000280SV-214322r960963_rule2025-02-123
Description
When accounts used for web server features such as documentation, sample code, example applications, tutorials, utilities, and services are created even though the feature is not installed, they become an exploitable threat to a web server. These accounts become inactive, are not monitored through regular use, and passwords for the accounts are not created or updated. An attacker, through very little effort, can use these accounts to gain access to the web server and begin investigating ways to elevate the account privileges. The accounts used for web server features not installed must not be created and must be deleted when these features are uninstalled. Satisfies: SRG-APP-000141-WSR-000078, SRG-APP-000211-WSR-000031, SRG-APP-000380-WSR-000072
ℹ️ Check
Obtain a list of the user accounts for the system, noting the privileges for each account. Verify with the System Administrator (SA) or the Information System Security Officer (ISSO) that all privileged accounts are mission essential and documented. Verify with the SA or the ISSO that all non-administrator access to shell scripts and operating system functions are mission essential and documented. If undocumented privileged accounts are present, this is a finding. If undocumented access to shell scripts or operating system functions is present, this is a finding.
✔️ Fix
Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.