CCE-27879-6Platform: apache-httpd2.2 | Date: (C)2013-02-19 (M)2022-10-10 |
The Apache "LogLevel" directive should be configured appropriately.
Parameter:
(1) debug / info / notice / warn / error / crit / alert / emerg
Technical Mechanism:
(1) Apache configuration file: LogLevel directive
CCSS Severity: | CCSS Metrics: |
CCSS Score : | Attack Vector: |
Exploit Score: | Attack Complexity: |
Impact Score: | Privileges Required: |
Severity: | User Interaction: |
Vector: | Scope: |
| Confidentiality: |
| Integrity: |
| Availability: |
| |
References: Resource Id | Reference |
---|
CIS Security Configuration Benchmark For Apache Web Server 2.2 Version 3.1.0 June 11th, 2012 | 1.6.1 Configure the Error Log (Level 1, Scorable)
Add or modify the LogLevel in the apache configuration to have a value of notice or lower. Note that is it is compliant to have a value of info or debug if there is a need for a more verbose log and the storage and monitoring processes are capable of handling the extra load. The recommended value is notice. LogLevel notice page 50 |
CIS Security Configuration Benchmark For Apache Web Server 2.2.0 Version 2.2.0 November 2008 | 1.17 Logging p31 |
DISA STIG Apache SITE 2.2 for Windows Release: 1 Benchmark Date: 23 Nov 2011 | Rule Title: The LogLevel directive must be enabled.
STIG ID: WA00620 W22 Rule ID: SV-33153r1_rule Vuln ID: V-26282
Severity: CAT II Class: Unclass |
DISA STIG Apache SITE 2.2 for Unix Release: 1 Benchmark Date: 23 Nov 2011 | Rule Title: The LogLevel directive must be enabled.
STIG ID: WA00620 A22 Rule ID: SV-33207r1_rule Vuln ID: V-26282
Severity: CAT II Class: Unclass |