[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-27879-6

Platform: apache-httpd2.2Date: (C)2013-02-19   (M)2022-10-10



The Apache "LogLevel" directive should be configured appropriately.


Parameter:

(1) debug / info / notice / warn / error / crit / alert / emerg


Technical Mechanism:

(1) Apache configuration file: LogLevel directive

CCSS Severity:CCSS Metrics:
CCSS Score : Attack Vector:
Exploit Score: Attack Complexity:
Impact Score: Privileges Required:
Severity: User Interaction:
Vector: Scope:
 Confidentiality:
 Integrity:
 Availability:
  

References:
Resource IdReference
CIS Security Configuration Benchmark For Apache Web Server 2.2 Version 3.1.0 June 11th, 20121.6.1 Configure the Error Log (Level 1, Scorable) Add or modify the LogLevel in the apache configuration to have a value of notice or lower. Note that is it is compliant to have a value of info or debug if there is a need for a more verbose log and the storage and monitoring processes are capable of handling the extra load. The recommended value is notice. LogLevel notice page 50
CIS Security Configuration Benchmark For Apache Web Server 2.2.0 Version 2.2.0 November 20081.17 Logging p31
DISA STIG Apache SITE 2.2 for Windows Release: 1 Benchmark Date: 23 Nov 2011Rule Title: The LogLevel directive must be enabled. STIG ID: WA00620 W22 Rule ID: SV-33153r1_rule Vuln ID: V-26282 Severity: CAT II Class: Unclass
DISA STIG Apache SITE 2.2 for Unix Release: 1 Benchmark Date: 23 Nov 2011Rule Title: The LogLevel directive must be enabled. STIG ID: WA00620 A22 Rule ID: SV-33207r1_rule Vuln ID: V-26282 Severity: CAT II Class: Unclass


CPE    1
cpe:/a:apache:http_server:2.2

© SecPod Technologies