AWStats Config Exposure¶
Description¶
Detects publicly accessible AWStats configuration information.
Remediation¶
To remediate AWStats Config Exposure, follow these steps:
-
Restrict access to the AWStats configuration file (usually
awstats.model.conf
or anyawstats.*.conf
) using.htaccess
or equivalent web server configuration to deny access from unauthorized users. -
Set correct file permissions to limit who can read or modify the configuration files on the server.
-
Ensure that your AWStats installation is up to date with the latest security patches.
-
Configure your web server to not serve
.conf
files directly to users. -
Regularly review your web server's access logs for any unauthorized attempts to access configuration files.
-
Consider using authentication mechanisms to protect sensitive directories and files.
-
If possible, place configuration files outside of the web-accessible directory.
-
Use strong passwords and change them regularly if authentication is used.
-
Conduct regular security audits to ensure that no unauthorized changes have been made to the configuration files.
-
Educate users and administrators about the importance of securing configuration files and monitoring access logs.
Configuration¶
Identifier:
information_disclosure/awstats_config_exposure
Examples¶
Ignore this check¶
Score¶
- Escape Severity:
Compliance¶
-
OWASP: API8:2023
-
pci: 2.2.5
- gdpr: Article-32
- soc2: CC6
- psd2: Article-95
- iso27001: A.12.6
- nist: SP800-44
- fedramp: AC-22
Classification¶
- CWE: 200