Avoid storing sensitive files in the web root
Summary
The system should store neither user-uploaded files nor files containing sensitive information in the web root.
Description
The web root is the topmost directory on a web server. If there is no sufficient access control, any file in this directory will be publicly available. Therefore, user-uploaded files and files containing sensitive information should not be stored on it.
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Machine | 🔴 |
Squad | 🟢 |
References
- CAPEC™-116. Excavation
- CWE™-219. Storage of file with sensitive data under web root
- CWE™-922. Insecure storage of sensitive information
- OWASP TOP 10-A2. Cryptographic failures
- PA-DSS-9_1. Any web server and any cardholder data storage component are not required to be on the same server
- PDPA-6_24. Protection of personal data
- CMMC-SI_L1-3_14_5. System & file scanning
- OSSTMM3-11_11_1. Data networks security - Privacy containment mapping
- NIST SSDF-PS_3_1. Archive and protect each software release
- ISSAF-K_9_1. Network security - Storage Area Network SAN (practices for the data-at-rest)
- ISSAF-T_19_2. Web application assessment - Global Countermeasures (server-side)
- OWASP SCP-12. File management
- OWASP ASVS-12_4_1. File storage
- CASA-8_2_2. Client-side Data Protection
- CASA-12_4_1. File Storage
Vulnerabilities
free trial
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.