STIGQter STIGQter: STIG Summary: Oracle HTTP Server 12.1.3 Security Technical Implementation Guide Version: 1 Release: 6 Benchmark Date: 24 Jan 2020: OHS must have the BrowserMatch directive disabled.

DISA Rule

SV-78835r1_rule

Vulnerability Number

V-64345

Group Title

SRG-APP-000141-WSR-000075

Rule Version

OH12-1X-000144

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor that contains a "BrowserMatch" directive.

2. Search for the "BrowserMatch" directive at the OHS server, virtual host, and directory configuration scopes.

3. Comment out the "BrowserMatch" directive and any surrounding "<IfModule dir_module>" directive if they exist.

Check Contents

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor that contains a "BrowserMatch" directive.

2. Search for the "BrowserMatch" directive at the OHS server, virtual host, and directory configuration scopes.

3. If the directive and any surrounding "BrowserMatch" directive exist and are not commented out, this is a finding.

Vulnerability Number

V-64345

Documentable

False

Rule Version

OH12-1X-000144

Severity Override Guidance

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor that contains a "BrowserMatch" directive.

2. Search for the "BrowserMatch" directive at the OHS server, virtual host, and directory configuration scopes.

3. If the directive and any surrounding "BrowserMatch" directive exist and are not commented out, this is a finding.

Check Content Reference

M

Target Key

2753

Comments