The ``++cgi.force_redirect++`` _php.ini_ configuration is on by default, and it prevents unauthenticated access to scripts when PHP is running as a CGI. Unfortunately, it must be disabled on IIS, OmniHTTPD and Xitami, but in all other cases it should be on. This rule raises an issue when when ``++cgi.force_redirect++`` is explicitly disabled. == Noncompliant Code Example [source,php] ---- ; php.ini cgi.force_redirect=0 ; Noncompliant ---- == See * https://owasp.org/Top10/A05_2021-Security_Misconfiguration/[OWASP Top 10 2021 Category A5] - Security Misconfiguration * https://www.owasp.org/index.php/Top_10-2017_A6-Security_Misconfiguration[OWASP Top 10 2017 Category A6] - Security Misconfiguration * https://cwe.mitre.org/data/definitions/305[MITRE, CWE-305] - Authentication Bypass by Primary Weakness ifdef::env-github,rspecator-view[] ''' == Implementation Specification (visible only on this page) include::message.adoc[] ''' == Comments And Links (visible only on this page) include::comments-and-links.adoc[] endif::env-github,rspecator-view[]