AWStats Config Exposure
Description
Detects publicly accessible AWStats configuration information.
Remediation
To remediate AWStats Config Exposure, follow these steps:
Restrict access to the AWStats configuration file (usually
awstats.model.conf
or anyawstats.*.conf
) using.htaccess
or equivalent web server configuration to deny access from unauthorized users.Set correct file permissions to limit who can read or modify the configuration files on the server.
Ensure that your AWStats installation is up to date with the latest security patches.
Configure your web server to not serve
.conf
files directly to users.Regularly review your web server's access logs for any unauthorized attempts to access configuration files.
Consider using authentication mechanisms to protect sensitive directories and files.
If possible, place configuration files outside of the web-accessible directory.
Use strong passwords and change them regularly if authentication is used.
Conduct regular security audits to ensure that no unauthorized changes have been made to the configuration files.
Educate users and administrators about the importance of securing configuration files and monitoring access logs.
Configuration
Identifier:
information_disclosure/awstats_config_exposure
Examples
Ignore this check
checks:
information_disclosure/awstats_config_exposure:
skip: true
Score
- Escape Severity: HIGH
Compliance
OWASP: API8:2023
pci: 2.2.5
gdpr: Article-32
soc2: CC6
psd2: Article-95
iso27001: A.12.6
nist: SP800-44
fedramp: AC-22
Classification
- CWE: 200