This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "SCG WS nginx"
(Created page with "{{Template:OWASP Secure Configuration Guide}}") |
|||
| Line 1: | Line 1: | ||
{{Template:OWASP Secure Configuration Guide}} | {{Template:OWASP Secure Configuration Guide}} | ||
| + | '''NEEDS TO BE REVIEWED, SEE REFERENCES BELOW FOR A GOOD MATERIAL!''' | ||
| + | |||
| + | == Summary == | ||
| + | A detailed description of the product (can be taken from the official website) | ||
| + | |||
| + | == Common Misconfigurations == | ||
| + | |||
| + | === Misconfiguration 1 === | ||
| + | ==== Description ==== | ||
| + | |||
| + | %ProductName% allows unauthorized attacker to list all users of the system ... | ||
| + | |||
| + | // Detailed description of the impact. Is it enabled by default? Vulnerable versions. | ||
| + | |||
| + | ==== How to test ==== | ||
| + | |||
| + | In order to test for %Misconfiguration_1%, one should ... | ||
| + | |||
| + | // Proof-of-concept here. Please include the screenshots and widely known tools/scanners! | ||
| + | |||
| + | ==== Remediation ==== | ||
| + | |||
| + | Initial/common value of parameter "listUsers" from config.xml is set to "true". | ||
| + | |||
| + | To assess the vulnerability it is enough to change the value to false: | ||
| + | |||
| + | <pre> | ||
| + | <security> | ||
| + | <listUsers>false</listUsers> | ||
| + | </security> | ||
| + | </pre> | ||
| + | |||
| + | |||
| + | == References == | ||
| + | |||
| + | https://nealpoole.com/blog/2011/04/setting-up-php-fastcgi-and-nginx-dont-trust-the-tutorials-check-your-configuration/ | ||
Revision as of 21:33, 19 December 2014
This article is part of the OWASP Secure Configuration Guide.
Back to the OWASP Secure Configuration Guide ToC: https://www.owasp.org/index.php/Secure_Configuration_Guide Back to the OWASP Secure Configuration Guide Project: https://www.owasp.org/index.php/OWASP_Secure_Configuration_Guide
NEEDS TO BE REVIEWED, SEE REFERENCES BELOW FOR A GOOD MATERIAL!
Summary
A detailed description of the product (can be taken from the official website)
Common Misconfigurations
Misconfiguration 1
Description
%ProductName% allows unauthorized attacker to list all users of the system ...
// Detailed description of the impact. Is it enabled by default? Vulnerable versions.
How to test
In order to test for %Misconfiguration_1%, one should ...
// Proof-of-concept here. Please include the screenshots and widely known tools/scanners!
Remediation
Initial/common value of parameter "listUsers" from config.xml is set to "true".
To assess the vulnerability it is enough to change the value to false:
<security> <listUsers>false</listUsers> </security>