rspec/rules/S3335/php/rule.adoc

28 lines
843 B
Plaintext
Raw Normal View History

2021-04-28 16:49:39 +02:00
The ``++cgi.force_redirect++`` _php.ini_ configuration is on by default, and it prevents unauthenticated access to scripts when PHP is running as a CGI. Unfortunately, it must be disabled on IIS, OmniHTTPD and Xitami, but in all other cases it should be on.
This rule raises an issue when when ``++cgi.force_redirect++`` is explicitly disabled.
2021-04-28 16:49:39 +02:00
== Noncompliant Code Example
----
; php.ini
cgi.force_redirect=0 ; Noncompliant
----
2021-04-28 16:49:39 +02:00
== See
* https://www.owasp.org/index.php/Top_10-2017_A6-Security_Misconfiguration[OWASP Top 10 2017 Category A6] - Security Misconfiguration
* http://cwe.mitre.org/data/definitions/305[MITRE, CWE-305] - Authentication Bypass by Primary Weakness
ifdef::env-github,rspecator-view[]
== Comments And Links
(visible only on this page)
include::comments-and-links.adoc[]
endif::env-github,rspecator-view[]