Microsoft InfoPath 2010

Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values.

Details

Version / Release: V1R8

Published: 2014-04-03

Updated At: 2018-09-23 04:09:47

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-33670r1_rule DTOO131 - InfoPath MEDIUM Trust Bar Notifications for unsigned application add-ins must be blocked. If an application is configured to require all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a m
    SV-33860r2_rule DTOO133 - InfoPath MEDIUM All automatic loading from Trusted Locations must be disabled. Trusted locations specified in the Trust Center are used to define file locations assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of security, without prompting the users for permission. If a
    SV-33657r1_rule DTOO157 - InfoPath MEDIUM Redirection behavior for upgraded web sites by SharePoint must be blocked. InfoPath automatically redirects user requests for sites that have not been upgraded to the temporary URL if it is located on the local intranet, but blocks them if the temporary URL is located elsewhere. InfoPath will prompt users before redirecting form
    SV-33627r1_rule DTOO167 - InfoPath MEDIUM Opening behavior for EMail forms containing code or scripts must be controlled. InfoPath notifies and prompts users before opening InfoPath e-mail forms that contain code or script. If this restriction is relaxed, InfoPath will open e-mail forms that contain code or script without prompting users, which could allow malicious code to
    SV-33651r1_rule DTOO176 - InfoPath MEDIUM Email with InfoPath forms must be configured to show UI to recipients. Malicious users could send e-mail InfoPath forms with embedded Web beacons that can be used to track when recipients open the form and provide confirmation that recipients' e-mail addresses are valid. Additional information gathered by the form or informa
    SV-33629r1_rule DTOO169 - InfoPath MEDIUM Dynamic caching of InfoPath eMail forms must be disabled. InfoPath caches form templates when they are attached to a mail item recognized as an InfoPath e-mail form. When users fill out forms running with a restricted security level, InfoPath uses the cached version of the mailed template, rather than any publis
    SV-33631r1_rule DTOO173 - InfoPath MEDIUM Disabling of email forms from the Full Trust Security Zone must be configured. InfoPath provides three security levels for form templates: Restricted, Domain, and Full Trust. The security levels determine whether a form template can access data on other domains, or access files and settings on your computer. Fully trusted forms have
    SV-33634r1_rule DTOO172 - InfoPath MEDIUM Disabling email forms from the Internet Security Zone must be configured. InfoPath e-mail forms can be designed by an external attacker and sent over the Internet as part of a phishing attempt. Users might fill out such forms and provide sensitive information to the attacker. By default, forms that originate from the Internet c
    SV-33636r1_rule DTOO171 - InfoPath MEDIUM Disabling email forms running in Restricted Security Level must be configured. InfoPath forms running with the restricted security level, can only access data stored on the forms. However, a malicious user could still send an e-mail form running with the restricted security level, in an attempt to access sensitive information provid
    SV-33661r1_rule DTOO159 - InfoPath MEDIUM Disabling of Fully Trusted Solutions access to computers must be configured. InfoPath users can choose whether to allow trusted forms to run on their computers. The Full Trust security level allows a form to access local system resources, such as COM components or files on users' computers, and suppresses certain security prompts.
    SV-33665r1_rule DTOO158 - InfoPath MEDIUM Disabling the opening of solutions from the Internet Security Zone must be configured. Attackers could use InfoPath solutions published to Internet Web sites to try to obtain sensitive information from users. By default, users can open InfoPath solutions that do not contain managed code from sources located in the Internet security zone as
    SV-33639r1_rule DTOO168 - InfoPath MEDIUM Disabling sending form templates with the email forms must be configured. InfoPath allows users to attach form templates when sending e-mail forms. If users are able to open form templates included with e-mail forms, rather than using a cached version that is previously published, an attacker could send a malicious form templat
    SV-33646r1_rule DTOO170 - InfoPath MEDIUM InfoPath 2003 forms as email forms in InfoPath 2010 must be disallowed. An attacker might target InfoPath 2003 forms to try and compromise an organization's security. InfoPath 2003 did not write a published location for e-mail forms, which means forms could open without a corresponding published location. By default, InfoPath
    SV-33652r1_rule DTOO164 - InfoPath MEDIUM Beaconing UI shown for opened forms must be configured. Malicious users can create InfoPath forms with embedded Web beacons that can be used to contact an external server when the user opens the form. Information could be gathered by the form, or information entered by users could be sent to an external server
    SV-33655r1_rule DTOO165 - InfoPath MEDIUM Beaconing of UI forms with ActiveX controls must be enforced. InfoPath makes it possible to host InfoPath forms in other applications as ActiveX controls. Such controls are known as InfoPath form controls. A malicious user could insert a Web beacon into one of these controls which could be used to contact an externa
    SV-33649r1_rule DTOO156 - InfoPath MEDIUM Offline Mode capability to cache queries for offline mode must be configured. InfoPath can function in online mode or offline mode. It can also cache queries for use in offline mode. If offline mode is used and cached queries are enabled, sensitive information contained in the cache could be at risk. By default, InfoPath is in onli
    SV-33668r1_rule DTOO160 - InfoPath MEDIUM Unsafe file types must be prevented from being attached to InfoPath forms. Users can attach any type of file to forms except potentially unsafe files that might contain viruses, such as .bat or .exe files. For the full list of file types that InfoPath disallows by default, see "Security Details" in Insert a file attachment contr
    SV-33851r1_rule DTOO127 - InfoPath MEDIUM Application add-ins must be signed by Trusted Publisher. Office 2010 applications do not check the digital signature on application add-ins before opening them. Disabling or not configuring this setting may allow an application to load a dangerous add-in. As a result, malicious code could become active on use
    SV-33856r1_rule DTOO128 - InfoPath MEDIUM Data Execution Prevention must be enforced. Data Execution Prevention (DEP) is a set of hardware and software technologies performing additional checks on memory to help prevent malicious code from running on a system. The primary benefit of DEP is to help prevent code execution from data pages. En
    SV-34111r1_rule DTOO294 - InfoPath MEDIUM InfoPath must be enforced to not use e-mail forms from the Intranet security zone. InfoPath e-mail forms can be designed by an internal attacker and sent over the local intranet, and users might fill out such forms and provide sensitive information to the attacker. By default, forms that originate from the local intranet can be opened.
    SV-34119r1_rule DTOO295 - InfoPath MEDIUM InfoPath e-mail forms in Outlook must be disallowed. Attackers can send users InfoPath e-mail forms in an attempt to gain access to confidential information. Depending on the level of trust of the forms, it might also be possible to gain access to other data automatically. By default, Outlook 2010 uses th
    SV-34123r1_rule DTOO296 - InfoPath MEDIUM Disabling opening forms with managed code from the Internet security zone must be configured. When InfoPath solutions are opened locally, the location of the form is checked so that updates to the form can be downloaded. If a user saves a form locally from a location on the Internet and then opens the same form from another location on the Intern
    SV-34221r1_rule DTOO297 - InfoPath MEDIUM A form that is digitally signed must be displayed with a warning. This setting controls whether the user sees a dialog box when opening Microsoft InfoPath forms containing digitally signed content. By default, InfoPath shows the user a warning message when the form contains a digital signature. System AdministratorInfor
    SV-33810r1_rule DTOO305 - InfoPath MEDIUM Disable UI extending from documents and templates must be disallowed. Office 2010 allows developers to extend the UI with customization code that is included in a document or template. If the customization code is written by an inexperienced or malicious developer, it could limit the accessibility or availability of importa
    SV-34226r1_rule DTOO309 - InfoPath MEDIUM The InfoPath APTCA Assembly Allowable List must be enforced. InfoPath 2010 forms' business logic can only call into Global Assembly Cache (GAC) assemblies listed in the APTCA Assembly Allowable List. If this configuration is changed, forms can call into any assembly in the GAC where the Allow Partially Trust Calle