SV-78961r1_rule
V-64471
SRG-APP-000246-WSR-000149
OH12-1X-000291
CAT II
10
1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor.
2. Search for the "LimitRequestLine" directive at the OHS server and virtual host configuration scopes.
3. Set the "LimitRequestLine" directive to a value of "512", add the directive if it does not exist.
Note: This vulnerability can be documented locally with the ISSM/ISSO if the site has operational reasons for the use of a higher value.
1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor.
2. Search for the "LimitRequestLine" directive at the OHS server and virtual host configuration scopes.
3. If the directive is omitted or is set greater than 512, this is a finding.
Note: This vulnerability can be documented locally with the ISSM/ISSO if the site has operational reasons for the use of a higher value.
V-64471
False
OH12-1X-000291
1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor.
2. Search for the "LimitRequestLine" directive at the OHS server and virtual host configuration scopes.
3. If the directive is omitted or is set greater than 512, this is a finding.
Note: This vulnerability can be documented locally with the ISSM/ISSO if the site has operational reasons for the use of a higher value.
M
2753