Microsoft InfoPath 2007 Security Technical Implementation Guide

  • Version/Release: V4R13
  • Published: 2017-10-02
  • Expand All:
  • Severity:
  • Sort:
Compare

Select any two versions of this STIG to compare the individual requirements

View

Select any old version/release of this STIG to view the previous requirements

b
Disable user name and password syntax from being used in URLs
Medium - V-17173 - SV-18182r2_rule
RMF Control
Severity
Medium
CCI
Version
DTOO104 - InfoPath
Vuln IDs
  • V-17173
Rule IDs
  • SV-18182r2_rule
The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:password@example.com. A malicious user might use this URL syntax to create a hyperlink that appears to open a legitimate website but actually opens a deceptive (spoofed) website. For example, the URL http://www.wingtiptoys.com@example.com appears to open http://www.wingtiptoys.com but actually opens http://example.com. To protect users from such attacks, Internet Explorer usually blocks any URLs using this syntax. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a web page). If user names and passwords in URLs are allowed, users could be diverted to dangerous web pages, which could pose a security risk. System AdministratorInformation Assurance Officer
Checks: C-17857r3_chk

Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings -> IE Security “Disable user name and password” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.

Fix: F-16959r3_fix

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Disable user name and password” to “Enabled” and select the "spDesign.exe" check box.

b
Enable IE Bind to Object functionality for instances of IE launched from InfoPath.
Medium - V-17174 - SV-18189r2_rule
RMF Control
Severity
Medium
CCI
Version
DTOO111 - InfoPath
Vuln IDs
  • V-17174
Rule IDs
  • SV-18189r2_rule
Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control if the kill bit for the control is set in the registry, or if the security settings for the zone in which the control is located do not allow it to be initialized. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a web page). A security risk could occur if potentially dangerous controls are allowed to load. System AdministratorInformation Assurance Officer
Checks: C-17871r3_chk

Valid the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Bind to Object” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.

Fix: F-16965r3_fix

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Bind to Object” to “Enabled” and select the "spDesign.exe" check box.

b
Evaluate Saved from URL mark when launched from InfoPath.
Medium - V-17175 - SV-18204r2_rule
RMF Control
Severity
Medium
CCI
Version
DTOO117 - InfoPath
Vuln IDs
  • V-17175
Rule IDs
  • SV-18204r2_rule
Typically, when Internet Explorer loads a web page from a UNC share that contains a Mark of the Web (MOTW) comment that indicates the page was saved from a site on the Internet, Internet Explorer runs the page in the Internet security zone instead of the less restrictive Local Intranet security zone. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a web page). If Internet Explorer does not evaluate the page for a MOTW, potentially dangerous code could be allowed to run.System AdministratorInformation Assurance Officer
Checks: C-17887r3_chk

Validate the policy value for Computer Configuration -> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Saved from URL” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.

Fix: F-17051r3_fix

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Saved from URL” to “Enabled” and select the "spDesign.exe" check box.

b
Block navigation to URL embedded in Office products to protect against attack by malformed URL.
Medium - V-17183 - SV-18601r2_rule
RMF Control
Severity
Medium
CCI
Version
DTOO123 - InfoPath
Vuln IDs
  • V-17183
Rule IDs
  • SV-18601r2_rule
To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a web page). If Internet Explorer attempts to load a malformed URL, a security risk could occur in some cases.System AdministratorInformation Assurance Officer
Checks: C-18843r3_chk

Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Navigate URL” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.

Fix: F-17443r3_fix

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Navigate URL” to “Enabled” and select the "spDesign.exe" check box.

b
Block pop-ups for links that invoke instances of IE from within InfoPath.
Medium - V-17184 - SV-18214r2_rule
RMF Control
Severity
Medium
CCI
Version
DTOO129 - InfoPath
Vuln IDs
  • V-17184
Rule IDs
  • SV-18214r2_rule
The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearing. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a web page). If the Pop-up Blocker is disabled, disruptive and potentially dangerous pop-up windows could load and present a security risk.System AdministratorInformation Assurance Officer
Checks: C-17898r3_chk

Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Block popups” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.

Fix: F-17059r3_fix

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Block popups” to “Enabled” and select the "spDesign.exe" check box.

b
Disable Trust Bar Notification for unsigned application add-ins - InfoPath
Medium - V-17187 - SV-18221r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO131 - InfoPath
Vuln IDs
  • V-17187
Rule IDs
  • SV-18221r1_rule
By default, if an application is configured to require that all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message that informs users about the unsigned add-in.System AdministratorInformation Assurance Officer
Checks: C-17914r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.

Fix: F-17081r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”.

b
Block redirection behavior for upgraded web sites by SharePoint - Infopath.
Medium - V-17576 - SV-18691r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO157 - InfoPath
Vuln IDs
  • V-17576
Rule IDs
  • SV-18691r1_rule
During a Windows SharePoint Services gradual upgrade, sites that have been upgraded remain available at their original URLs (for example, http:///sites/SiteA), while sites that are still in the process of being upgraded are located at a temporary domain URL (for example, http:///sites/SiteB). By default, InfoPath 2007 automatically redirects user requests for sites that have not been upgraded to the temporary URL if it is located on the local intranet, but blocks them if the temporary URL is located elsewhere. InfoPath will prompt users before redirecting forms or form templates to another intranet site. If this restriction is relaxed, all requests to sites that have not been upgraded will be redirected to their targets, regardless of location. This functionality could cause requests made to a secure site to be redirected to an unsecured one (for example, requests to an intranet site could be redirected to an unencrypted Internet site), causing sensitive information to be at risk.System AdministratorInformation Assurance Officer
Checks: C-18877r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior for Windows SharePoint Services gradual upgrade” will be set to “Enabled (Block all redirections)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value GradualUpgradeRedirection is REG_DWORD = 2, this is not a finding.

Fix: F-17494r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior for Windows SharePoint Services gradual upgrade” will be set to “Enabled (Block all redirections)”.

b
Control "open forms" behavior for Internet Security zone - InfoPath
Medium - V-17577 - SV-18693r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO161 - InfoPath
Vuln IDs
  • V-17577
Rule IDs
  • SV-18693r1_rule
When InfoPath solutions are opened locally, the location of the form is checked so that updates to the form can be downloaded. If a user saves a form locally from a location on the Internet and then opens the same form from another location on the Internet, the cache will be updated with the new location information. If the user then opens the first form from its saved location, there will be a mismatch between the locally saved form and the locally cached form. This situation would typically happen when developers move forms to a new location, but if there is no warning when the cached location is used it could be misused by an attacker attempting to redirect the forms to a new location. This type of attack is a form of beaconing. By default, if the location information in the cached form and the saved form do not match, the form cannot be opened without prompting the user for consent. System AdministratorInformation Assurance Officer
Checks: C-18878r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Internet security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Internet is REG_DWORD = 0, this is not a finding.

Fix: F-17495r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Internet security zone” will be set to “Enabled (Block)”.

b
Control behavior when opening forms in the Intranet Security Zone - InfoPath
Medium - V-17578 - SV-18695r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO162 - InfoPath
Vuln IDs
  • V-17578
Rule IDs
  • SV-18695r1_rule
When InfoPath solutions are opened locally, the location of the form is checked so that updates to the form can be downloaded. If a user saves a form locally from a location on the Local Intranet and then opens the same form from another location on the Local Intranet, the cache will be updated with the new location information. If the user then opens the first form from its saved location, there will be a mismatch between the locally saved form and the locally cached form. This situation would typically happen when developers move forms to a new location, but if there is no warning when the cached location is used it could be misused by an attacker attempting to redirect the forms to a new location. This type of attack is a form of beaconing. By default, if the location information in the cached form and the saved form do not match, then the form cannot be opened without prompting the user for consent. System AdministratorInformation Assurance Officer
Checks: C-18879r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Intranet security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Intranet is REG_DWORD = 0, this is not a finding.

Fix: F-17497r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Intranet security zone” will be set to “Enabled (Block)”.

b
Control behavior when opening eMail forms in the Trusted Site Security Zone - InfoPath
Medium - V-17579 - SV-18697r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO163 - InfoPath
Vuln IDs
  • V-17579
Rule IDs
  • SV-18697r1_rule
When InfoPath solutions are opened locally, the location of the form is checked so that updates to the form can be downloaded. If a user saves a form locally from a location in the Trusted Sites zone and then opens the same form from another location in the Trusted Sites zone, the cache will be updated with the new location information. If the user then opens the first form from its saved location, there will be a mismatch between the locally saved form and the locally cached form. This situation would typically happen when developers move forms to a new location, but if there is no warning when the cached location is used it could be misused by an attacker attempting to redirect the forms to a new location. This type of attack is a form of beaconing. By default, if the location information in the cached form and the saved form do not match, then the form cannot be opened without prompting the user for consent. System AdministratorInformation Assurance Officer
Checks: C-18880r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Trusted Site security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Trusted Site is REG_DWORD = 0, this is not a finding.

Fix: F-17498r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Trusted Site security zone” will be set to “Enabled (Block)”.

b
Control Forms Opening behavior for EMail forms containing code or scripts - InfoPath.
Medium - V-17580 - SV-18699r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO167 - InfoPath
Vuln IDs
  • V-17580
Rule IDs
  • SV-18699r1_rule
By default, InfoPath 2007 notifies and prompts users before opening InfoPath e-mail forms that contain code or script. If this restriction is relaxed, InfoPath will open e-mail forms that contain code or script without prompting users, which could allow malicious code to run on the users' computers.System AdministratorInformation Assurance Officer
Checks: C-18881r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Control behavior when opening InfoPath e-mail forms containing code or script” will be set to “Enabled (Prompt before running)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EMailFormsRunCodeAndScript is REG_DWORD = 1, this is not a finding.

Fix: F-17499r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Control behavior when opening InfoPath e-mail forms containing code or script” will be set to “Enabled (Prompt before running)”.

b
Enable the Restriction on adding custom code to InfoPath forms.
Medium - V-17582 - SV-18703r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO175 - InfoPath
Vuln IDs
  • V-17582
Rule IDs
  • SV-18703r1_rule
By default, users can design new InfoPath 2007 forms that use custom code to add interactivity and other functionality to forms. Designers can add managed code written in C# and Visual Basic .NET, as well as scripts written in Jscript and VBScript. An inexperienced or malicious user could design a form with dangerous code that harms users' computers or puts sensitive data at risk. System AdministratorInformation Assurance Officer
Checks: C-18883r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Custom code” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Designer\RestrictedFeatures Criteria: If the value CodeAllowed is REG_DWORD = 0, this is not a finding.

Fix: F-17501r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Custom code” will be set to “Enabled”.

b
Email with InfoPath forms to show UI to recipients.
Medium - V-17611 - SV-18745r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO176 - InfoPath
Vuln IDs
  • V-17611
Rule IDs
  • SV-18745r1_rule
Malicious users could send e-mail InfoPath forms with embedded Web beacons that can be used to track when recipients open the form and provide confirmation that recipients' e-mail addresses are valid. Additional information gathered by the form or information entered by users could also be sent to an external server and leave the users vulnerable to additional attacks. By default, InfoPath 2007 users are only warned of a beaconing threat if the form originates from the Internet. System AdministratorInformation Assurance Officer
Checks: C-18909r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Miscellaneous “Email Forms Beaconing UI” will be set to “Enabled (Always show UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EmailFormsBeaconingUI is REG_DWORD = 1, this is not a finding.

Fix: F-17525r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Miscellaneous “Email Forms Beaconing UI” will be set to “Enabled (Always show UI)”.

b
Disable the Information Rights Management feature for InfoPath.
Medium - V-17646 - SV-18793r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO174 - InfoPath
Vuln IDs
  • V-17646
Rule IDs
  • SV-18793r1_rule
By default, users can use Information Rights Management (IRM) in InfoPath 2007 to create forms that have restricted permission for specific people who will access the form. By using IRM, users can help prevent sensitive information from being printed, forwarded, or copied by unauthorized people.System AdministratorInformation Assurance Officer
Checks: C-18921r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Information Rights Management” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Designer\RestrictedFeatures Criteria: If the value IRMAllowed is REG_DWORD = 1, this is not a finding.

Fix: F-17548r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Information Rights Management” will be set to “Disabled”.

b
Disable dynamic caching of the form template in InfoPath eMail forms.
Medium - V-17654 - SV-18804r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO169 - InfoPath
Vuln IDs
  • V-17654
Rule IDs
  • SV-18804r1_rule
By default, InfoPath 2007 caches form templates when they are attached to a mail item that is recognized as an InfoPath e-mail form. When users fill out forms that open with a restricted security level, InfoPath uses the cached version of the mailed template, rather than any published version. To circumvent users filling out a published form, an attacker could e-mail an alternate version of the form, which would return the data to the sender as part of a phishing attack and could be used to gain access to confidential information. System AdministratorInformation Assurance Officer
Checks: C-18925r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable dynamic caching of the form template in InfoPath e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Deployment Criteria: If the value CacheMailXSN is REG_DWORD = 0, this is not a finding.

Fix: F-17552r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable dynamic caching of the form template in InfoPath e-mail forms” will be set to “Enabled”.

b
Disable email forms from the Full Trust Security Zone - InfoPath
Medium - V-17655 - SV-18806r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO173 - InfoPath
Vuln IDs
  • V-17655
Rule IDs
  • SV-18806r1_rule
InfoPath provides three security levels for form templates: Restricted, Domain, and Full Trust. The security levels determine whether a form template can access data on other domains, or access files and settings on your computer. Fully trusted forms have a Full Trust security level, and can access files and settings on users' computers. The form template for these forms must be digitally signed with a trusted root certificate, or installed on users' computers. By default, InfoPath 2007 can open e-mail forms with full trust. If an attacker designs and sends a dangerous fully trusted e-mail form, it could affect users' computers or give the attacker access to sensitive information. System AdministratorInformation Assurance Officer
Checks: C-18926r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Full Trust security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableFullTrustEmailForms is REG_DWORD = 0, this is not a finding.

Fix: F-17553r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Full Trust security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableFullTrustEmailForms is REG_DWORD = 0, this is not a finding.

b
Disable eMail forms from the Internet Security Zone for InfoPath.
Medium - V-17656 - SV-18808r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO172 - InfoPath
Vuln IDs
  • V-17656
Rule IDs
  • SV-18808r1_rule
InfoPath 2007 e-mail forms can be designed by an external attacker and sent over the Internet as part of a phishing attempt. Users might fill out such forms and provide sensitive information to the attacker. By default, forms that originate from the Internet can be opened, although those forms cannot access content that is stored in a different domain. System AdministratorInformation Assurance Officer
Checks: C-18927r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Internet security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableInternetEMailForms is REG_DWORD = 0, this is not a finding.

Fix: F-17554r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Internet security zone” will be set to “Enabled”.

b
Disable eMail forms running in Restricted Security Level - InfoPath.
Medium - V-17657 - SV-18810r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO171 - InfoPath
Vuln IDs
  • V-17657
Rule IDs
  • SV-18810r1_rule
InfoPath 2007 forms that run with the restricted security level can only access data that is stored on the forms. However, a malicious user could still send an e-mail form that runs with the restricted security level in an attempt to access sensitive information provided by users. By default InfoPath 2007 e-mail forms running with the restricted security level can be opened. System AdministratorInformation Assurance Officer
Checks: C-18928r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms running in restricted security level” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableRestrictedEMailForms is REG_DWORD = 0, this is not a finding.

Fix: F-17555r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms running in restricted security level” will be set to “Enabled”.

b
Disable Fully Trusted Solutions access to computers - InfoPath
Medium - V-17658 - SV-18812r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO159 - InfoPath
Vuln IDs
  • V-17658
Rule IDs
  • SV-18812r1_rule
By default, InfoPath 2007 users can choose whether to allow trusted forms to run on their computers. The Full Trust security level allows a form to access local system resources, such as COM components or files on users' computers, and suppresses certain security prompts. It can only be used with forms that are installed on users' computers or with forms using a form template that is digitally signed with a trusted root certificate. As with any security model that allows trusted entities to operate with fewer security controls, if a form with malicious content is marked as fully trusted it could be used to compromise information security or affect users' computers. System AdministratorInformation Assurance Officer
Checks: C-18929r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable fully trusted solutions full access to computer” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security\ Criteria: If the value RunFullTrustSolutions is REG_DWORD = 0, this is not a finding.

Fix: F-17556r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable fully trusted solutions full access to computer” will be set to “Enabled”.

b
Disable opening of solutions from the Internet Security Zone - InfoPath.
Medium - V-17663 - SV-18822r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO158 - InfoPath
Vuln IDs
  • V-17663
Rule IDs
  • SV-18822r1_rule
Attackers could use InfoPath 2007 solutions published to Internet Web sites to try to obtain sensitive information from users. By default, users can open InfoPath solutions that do not contain managed code from sources located in the Internet security zone as defined in the Internet Options dialog box in Internet Explorer. System AdministratorInformation Assurance Officer
Checks: C-18934r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable opening of solutions from the Internet security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value AllowInternetSolutions is REG_DWORD = 0, this is not a finding.

Fix: F-17561r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable opening of solutions from the Internet security zone” will be set to “Enabled”.

b
Disable sending the form template with the eMail form in InfoPath.
Medium - V-17667 - SV-18830r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO168 - InfoPath
Vuln IDs
  • V-17667
Rule IDs
  • SV-18830r1_rule
By default, InfoPath 2007 allows users to attach form templates when sending e-mail forms. If users are able to open form templates included with e-mail forms, rather than using a cached version that is previously published, an attacker could send a malicious form template with the e-mail form in an attempt to gain access to sensitive information. Note The form template is only opened directly if the form opens with a restricted security level. Otherwise the attachment is actually a link to the published location. System AdministratorInformation Assurance Officer
Checks: C-18938r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending form template with e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Deployment Criteria: If the value MailXSNwithXML is REG_DWORD = 0, this is not a finding.

Fix: F-17565r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending form template with e-mail forms” will be set to “Enabled”.

b
Disable sending "InfoPath 2003" forms as email forms in InfoPath 2007.
Medium - V-17668 - SV-18832r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO170 - InfoPath
Vuln IDs
  • V-17668
Rule IDs
  • SV-18832r1_rule
An attacker might target InfoPath 2003 forms to try and compromise an organization's security. InfoPath 2003 did not write a publish location for e-mail forms, which meant that forms could open without a corresponding published location. By default, InfoPath 2007 sends all forms via e-mail using InfoPath e-mail forms integration, including forms that were created using the InfoPath 2003 file format. System AdministratorInformation Assurance Officer
Checks: C-18939r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending InfoPath 2003 Forms as e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath Criteria: If the value DisableInfoPath2003EmailForms is REG_DWORD = 1, this is not a finding.

Fix: F-17566r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending InfoPath 2003 Forms as e-mail forms” will be set to “Enabled”.

b
Beaconing UI shown for forms opened in InfoPath - InfoPath
Medium - V-17745 - SV-18930r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO164 - InfoPath
Vuln IDs
  • V-17745
Rule IDs
  • SV-18930r1_rule
Malicious users can create InfoPath forms with embedded Web beacons that can be used to contact an external server when the user opens the form. Information could be gathered by the form, or information entered by users could be sent to an external server and cause them to be vulnerable to additional attacks. By default, InfoPath 2007 warns users about potential Web beaconing threats. System AdministratorInformation Assurance Officer
Checks: C-19007r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath” will be set to “Enabled (Always show beaconing UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value InfoPathBeaconingUI is REG_DWORD = 1, this is not a finding.

Fix: F-17644r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath” will be set to “Enabled (Always show beaconing UI)”.

b
Beaconing UI forms opened in Editor ActiveX - InfoPath
Medium - V-17746 - SV-18932r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO165 - InfoPath
Vuln IDs
  • V-17746
Rule IDs
  • SV-18932r1_rule
InfoPath 2007 makes it possible to host InfoPath forms in other applications as ActiveX controls. Such controls are known as InfoPath form controls. A malicious user could insert a Web beacon into one of these controls which could be used to contact an external server when the user opens the form. Information could be gathered by the form, or information entered by users could be sent to an external server and cause them to be vulnerable to additional attacks. By default, InfoPath form controls warn users about potential Web beaconing threats. System AdministratorInformation Assurance Officer
Checks: C-19008r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath Editor ActiveX” will be set to “Enabled (Always show beaconing UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EditorActiveXBeaconingUI is REG_DWORD = 1, this is not a finding.

Fix: F-17645r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath Editor ActiveX” will be set to “Enabled (Always show beaconing UI)”.

b
Offline Mode enabled to cache queries for offline mode.
Medium - V-17758 - SV-18954r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO156 - InfoPath
Vuln IDs
  • V-17758
Rule IDs
  • SV-18954r1_rule
InfoPath 2007 can function in online mode or offline mode. It can also cache queries for use in offline mode. If offline mode is used and cached queries are enabled, sensitive information contained in the cache could be at risk. By default, InfoPath is in online mode, but offline mode is available to users. Users can also cache queries for use in offline mode. System AdministratorInformation Assurance Officer
Checks: C-19021r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Tools \ Options -> Advanced -> Offline “Offline Mode status” will be set to “Enabled (Enabled, InfoPath not in Offline Mode)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Editor\Offline Criteria: If the value CachedModeStatus is REG_DWORD = 2, this is not a finding

Fix: F-17657r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Tools \ Options -> Advanced -> Offline “Offline Mode status” will be set to “Enabled (Enabled, InfoPath not in Offline Mode)”.

b
Prevent unsafe file types to be attached to InfoPath forms.
Medium - V-17764 - SV-18966r1_rule
RMF Control
Severity
Medium
CCI
Version
DTOO160 - InfoPath
Vuln IDs
  • V-17764
Rule IDs
  • SV-18966r1_rule
By default, users can attach any type of file to forms except potentially unsafe files that might contain viruses, such as .bat or .exe files. For the full list of file types that InfoPath 2007 disallows by default, see "Security Details" in Insert a file attachment control on the Microsoft Office Online Web site. If unsafe file types are added to InfoPath forms, they might be used as a means of attacking the computer on which the form is opened. These unsafe file types may include active content, or may introduce other vulnerabilities that an attacker can exploit. System AdministratorInformation Assurance Officer
Checks: C-19027r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Prevent users from allowing unsafe file types to be attached to forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.

Fix: F-17663r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Prevent users from allowing unsafe file types to be attached to forms” will be set to “Enabled”.

c
An unsupported Microsoft Office version must not be installed.
High - V-25884 - SV-32370r3_rule
RMF Control
Severity
High
CCI
Version
DTOO287
Vuln IDs
  • V-25884
Rule IDs
  • SV-32370r3_rule
Failure to install the most current Office version leaves a system vulnerable to exploitation. Current service packs correct known security and system vulnerabilities. If Microsoft Office installation is not at the most current version and service pack level, this is a Category 1 finding since new vulnerabilities will not be patched. Office 2007 is End of Life. System Administrator
Checks: C-32765r4_chk

To determine what service pack level is installed, start the Office application. Click on the Office Menu Button (upper left), click "Options" at the bottom of the menu, and select "Resources" from the left column. The version number will be displayed alongside the "About" button on the right-hand side display. If the "About" box information displays an Office 2007 version, this is a finding.

Fix: F-28840r3_fix

Upgrade to Office 2010, Office 2013, or Office 2016.