11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Securing Your <strong>Web</strong> Server 453Additional ConsiderationsAdditionally, you can configure IIS W3C Extended Log File Format Auditing. SelectW3C Extended Log File Format on the <strong>Web</strong> Site tab of the <strong>Web</strong> site’s propertiesdialog box. You can then choose Extended Properties such as URI Stem <strong>and</strong> URIQuery.Step 11. Sites <strong>and</strong> Virtual DirectoriesRelocate <strong>Web</strong> roots <strong>and</strong> virtual directories to a non-system partition to protect againstdirectory traversal attacks. These attacks allow an attacker to execute operatingsystem programs <strong>and</strong> utilities. It is not possible to traverse across drives. Forexample, this approach ensures that any future canonicalization worm that allows anattacker to access system files will fail. For example, if the attacker formulates a URLthat contains the following path, the request fails:/scripts/..%5c../winnt/system32/cmd.exeDuring this step, you:● Move your <strong>Web</strong> site to a non-system volume.●●●●●Disable the parent paths setting.Remove potentially dangerous virtual directories.Remove or secure RDS.Set <strong>Web</strong> permissions.Remove or secure FrontPage Server Extensions.Move Your <strong>Web</strong> site to a Non-System VolumeDo not use the default \inetpub\wwwroot directory. For example, if your system isinstalled on the C: drive, then move your site <strong>and</strong> content directory to the D: drive.This mitigates the risks associated with unforeseen canonicalization issues <strong>and</strong>directory traversal attacks.Disable the Parent Paths SettingThis IIS metabase setting prevents the use of “..” in script <strong>and</strong> application calls tofunctions such as MapPath. This helps guard against directory traversal attacks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!