<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Finding in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-finding/m-p/6827225#M729546</link>
    <description>&lt;P&gt;You can remove the finding by stopping the Apache web server. All HP-UX servers will have scripts in cgi-bin as well as jsp files. The directories are part of the HP-UX tools such as SMH. Removing the files will permanently disable several system admin web-based services such as SMH.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This finding is a bit strange. Any computer that has web pages will have these directories. Removing them causes these pages to stop working. This isn't just for HP-UX. This finding would affect Linux, Solaris, AIX, anything that is running web pages. Since removing these files would cripple the functionality, you need to ask the network team about&amp;nbsp;creating an isolated subnet with restricted access.&lt;/P&gt;</description>
    <pubDate>Wed, 27 Jan 2016 01:35:57 GMT</pubDate>
    <dc:creator>Bill Hassell</dc:creator>
    <dc:date>2016-01-27T01:35:57Z</dc:date>
    <item>
      <title>Security Finding</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-finding/m-p/6827122#M729545</link>
      <description>&lt;P&gt;We recently had a security audit on our HP servers. Can files under /cgi-bin be removed? Any recomendation for securing these pages?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;The Assessment Team discovered directories containing jsp and cgi scripts. These scripts provided the team with valuable information. For example, the team browsed to &lt;/SPAN&gt;&lt;A href="http://10.1.2.82/cgi-bin/showuser.cgi" target="_blank"&gt;&lt;SPAN&gt;http://xx.x.x.82/cgi-bin/showuser.cgi&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; and discovered the web service was running as the user www. The team was also able to browse to &lt;/SPAN&gt;&lt;A href="http://10.1.2.82/cgi-bin/man2html%20and%20search%20for%20man%20pages" target="_blank"&gt;&lt;SPAN&gt;http://&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="http://10.1.2.82/cgi-bin/showuser.cgi" target="_blank"&gt;xx.x.x&lt;/A&gt;82/cgi-bin/man2html and search for man pages&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;A href="http://10.1.2.82/cgi-bin/printenv" target="_blank"&gt;&lt;SPAN&gt;http://&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="http://10.1.2.82/cgi-bin/showuser.cgi" target="_blank"&gt;xx.x.x&lt;/A&gt;82/cgi-bin/printenv&lt;SPAN&gt; provided environment variable information&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Remove any unnecessary default directories or script.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;I found these locations:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-left: 1.125in; font-family: Calibri; font-size: 11.0pt;"&gt;# find . -name cgi-bin&lt;/P&gt;&lt;P style="margin: 0in; margin-left: 1.125in; font-family: Calibri; font-size: 11.0pt;"&gt;./opt/hpsmh/data/cgi-bin&lt;/P&gt;&lt;P style="margin: 0in; margin-left: 1.125in; font-family: Calibri; font-size: 11.0pt;"&gt;./opt/hpws22/apache/cgi-bin&lt;/P&gt;&lt;P style="margin: 0in; margin-left: 1.125in; font-family: Calibri; font-size: 11.0pt;"&gt;./opt/hpws22/apache/hpws_docs/.hp_docs/cgi-bin&lt;/P&gt;&lt;P style="margin: 0in; margin-left: 1.125in; font-family: Calibri; font-size: 11.0pt;"&gt;./opt/hpws22/tomcat/hpws_docs/.hp_docs/cgi-bin&lt;/P&gt;&lt;P style="margin: 0in; margin-left: 1.125in; font-family: Calibri; font-size: 11.0pt;"&gt;./opt/hpws22/hp_docs/cgi-bin&lt;/P&gt;&lt;P style="margin: 0in; margin-left: 1.125in; font-family: Calibri; font-size: 11.0pt;"&gt;./opt/hpws/xmltools/hpws_docs/.hp_docs/cgi-bin&lt;/P&gt;&lt;P style="margin: 0in; margin-left: 1.125in; font-family: Calibri; font-size: 11.0pt;"&gt;./opt/hpws/hp_docs/cgi-bin&lt;/P&gt;&lt;P style="margin: 0in; margin-left: 1.125in; font-family: Calibri; font-size: 11.0pt;"&gt;#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Jon&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2016 19:07:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-finding/m-p/6827122#M729545</guid>
      <dc:creator>Jonathan Grymes</dc:creator>
      <dc:date>2016-01-26T19:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: Security Finding</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-finding/m-p/6827225#M729546</link>
      <description>&lt;P&gt;You can remove the finding by stopping the Apache web server. All HP-UX servers will have scripts in cgi-bin as well as jsp files. The directories are part of the HP-UX tools such as SMH. Removing the files will permanently disable several system admin web-based services such as SMH.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This finding is a bit strange. Any computer that has web pages will have these directories. Removing them causes these pages to stop working. This isn't just for HP-UX. This finding would affect Linux, Solaris, AIX, anything that is running web pages. Since removing these files would cripple the functionality, you need to ask the network team about&amp;nbsp;creating an isolated subnet with restricted access.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jan 2016 01:35:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-finding/m-p/6827225#M729546</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2016-01-27T01:35:57Z</dc:date>
    </item>
  </channel>
</rss>

