Microsoft InfoPath 2013 STIG

V1R5 2018-04-03       U_MS_InfoPath_2013_STIG_V1R5_Manual-xccdf.xml
V1R3 2015-06-18       U_MicrosoftInfoPath2013_V1R3_Manual-xccdf.xml
The Microsoft InfoPath 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Comparison
All 23
No Change 0
Updated 0
Added 23
Removed 0
V-17187 Added
Findings ID: DTOO131 Rule ID: SV-53331r1_rule Severity: medium CCI: CCI-001749

Discussion

If an application is configured to require all add-ins to be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message informing users about the unsigned add-in. If a user is allowed to make the determination to allow an unsigned add-in, it increases the risk of malicious code being introduced onto the user's computer or the network.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" to "Enabled".
V-17471 Added
Findings ID: DTOO133 Rule ID: SV-53333r2_rule Severity: medium CCI: CCI-001170

Discussion

Trusted locations specified in the Trust Center are used to define file locations assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of security, without prompting the users for permission. If a dangerous file is opened from a trusted location, it will not be subject to standard security measures and could harm users' computers or data. By default, files located in trusted locations (those specified in the Trust Center) are assumed to be safe.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> Trust Center "Disable all trusted locations" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security\trusted locations Criteria: If the value AllLocationsDisabled is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> Trust Center "Disable all trusted locations" to "Enabled".
V-17576 Added
Findings ID: DTOO157 Rule ID: SV-53337r1_rule Severity: medium CCI: CCI-001242

Discussion

InfoPath automatically redirects user requests for sites that have not been upgraded to the temporary URL if it is located on the local intranet, but blocks them if the temporary URL is located elsewhere. InfoPath will prompt users before redirecting forms or form templates to another intranet site. If this restriction is relaxed, all requests to sites that have not been upgraded will be redirected to their targets, regardless of location. This functionality could cause requests made to a secure site to be redirected to an unsecured one (for example, requests to an intranet site could be redirected to an unencrypted Internet site), causing sensitive information to be at risk.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Control behavior for Microsoft SharePoint Foundation gradual upgrade" must be set to "Enabled (Block all redirections)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value GradualUpgradeRedirection is REG_DWORD = 2, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Control behavior for Microsoft SharePoint Foundation gradual upgrade" to "Enabled (Block all redirections)".
V-17580 Added
Findings ID: DTOO167 Rule ID: SV-53362r1_rule Severity: medium CCI: CCI-002460

Discussion

InfoPath notifies and prompts users before opening InfoPath email forms that contain code or script. If this restriction is relaxed, InfoPath will open email forms that contain code or script without prompting users, which could allow malicious code to run on the users' computers.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Control behavior when opening InfoPath e-mail forms containing code or script" must be set to "Enabled (Prompt before running)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value EMailFormsRunCodeAndScript is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Control behavior when opening InfoPath e-mail forms containing code or script" to "Enabled (Prompt before running)".
V-17611 Added
Findings ID: DTOO176 Rule ID: SV-53384r1_rule Severity: medium CCI: CCI-001170

Discussion

Malicious users could send InfoPath email forms with embedded web beacons that can be used to track when recipients open the form and provide confirmation that recipients' email addresses are valid. Additional information gathered by the form or information entered by users could also be sent to an external server and leave the users vulnerable to additional attacks. By default, InfoPath users are only warned of a beaconing threat if the form originates from the Internet.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Miscellaneous "Email Forms Beaconing UI" must be set to "Enabled (Always show UI)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value EmailFormsBeaconingUI is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Miscellaneous "Email Forms Beaconing UI" to "Enabled (Always show UI)".
V-17654 Added
Findings ID: DTOO169 Rule ID: SV-53378r1_rule Severity: medium CCI: CCI-001170

Discussion

By default, InfoPath 2007 caches form templates when they are attached to a mail item that is recognized as an InfoPath e-mail form. When users fill out forms that open with a restricted security level, InfoPath uses the cached version of the mailed template, rather than any published version. To circumvent users filling out a published form, an attacker could e-mail an alternate version of the form, which would return the data to the sender as part of a phishing attack and could be used to gain access to confidential information. System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable dynamic caching of the form template in InfoPath e-mail forms" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\deployment Criteria: If the value CacheMailXSN is REG_DWORD = 0, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable dynamic caching of the form template in InfoPath e-mail forms" to "Enabled".
V-17655 Added
Findings ID: DTOO173 Rule ID: SV-53383r1_rule Severity: medium CCI: CCI-001170

Discussion

InfoPath provides three security levels for form templates: Restricted, Domain, and Full Trust. The security levels determine whether a form template can access data on other domains, or access files and settings on your computer. Fully trusted forms have a Full Trust security level, and can access files and settings on users' computers. The form template for these forms must be digitally signed with a trusted root certificate, or installed on users' computers. By default, InfoPath can open email forms with full trust. If an attacker designs and sends a dangerous fully trusted email form, it could affect users' computers or give the attacker access to sensitive information.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable e-mail forms from the Full Trust security zone" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value EnableFullTrustEmailForms is REG_DWORD = 0, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable e-mail forms from the Full Trust security zone" to "Enabled".
V-17656 Added
Findings ID: DTOO172 Rule ID: SV-53382r1_rule Severity: medium CCI: CCI-001170

Discussion

InfoPath email forms can be designed by an external attacker and sent over the Internet as part of a phishing attempt. Users might fill out such forms and provide sensitive information to the attacker. By default, forms that originate from the Internet can be opened, although those forms cannot access content stored in a different domain.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable e-mail forms from the Internet security zone" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value EnableInternetEMailForms is REG_DWORD = 0, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable e-mail forms from the Internet security zone" to "Enabled".
V-17657 Added
Findings ID: DTOO171 Rule ID: SV-53381r1_rule Severity: medium CCI: CCI-001170

Discussion

InfoPath forms running with the restricted security level, can only access data stored on the forms. However, a malicious user could still send an email form running with the restricted security level, in an attempt to access sensitive information provided by users. By default InfoPath email forms running with the restricted security level can be opened.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable e-mail forms running in restricted security level" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value EnableRestrictedEMailForms is REG_DWORD = 0, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable e-mail forms running in restricted security level" to "Enabled".
V-17658 Added
Findings ID: DTOO159 Rule ID: SV-53353r1_rule Severity: medium CCI: CCI-001749

Discussion

InfoPath users can choose whether to allow trusted forms to run on their computers. The Full Trust security level allows a form to access local system resources, such as COM components or files on users' computers, and suppresses certain security prompts. It can only be used with forms that are installed on users' computers or with forms using a form template that is digitally signed with a trusted root certificate. As with any security model that allows trusted entities to operate with fewer security controls, if a form with malicious content is marked as fully trusted it could be used to compromise information security or affect users' computers.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Disable fully trusted solutions full access to computer" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value RunFullTrustSolutions is REG_DWORD = 0, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Disable fully trusted solutions full access to computer" to "Enabled".
V-17663 Added
Findings ID: DTOO158 Rule ID: SV-53340r1_rule Severity: medium CCI: CCI-001170

Discussion

Attackers could use InfoPath solutions published to Internet Web sites to try to obtain sensitive information from users. By default, users can open InfoPath solutions that do not contain managed code from sources located in the Internet security zone as defined in the Internet Options dialog box in Internet Explorer.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Disable opening of solutions from the Internet security zone" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value AllowInternetSolutions is REG_DWORD = 0, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Disable opening of solutions from the Internet security zone" to "Enabled".
V-17667 Added
Findings ID: DTOO168 Rule ID: SV-53366r1_rule Severity: medium CCI: CCI-001170

Discussion

InfoPath allows users to attach form templates when sending email forms. If users are able to open form templates included with email forms, rather than using a cached version that is previously published, an attacker could send a malicious form template with the email form in an attempt to gain access to sensitive information. Note: The form template is only opened directly if the form opens with a restricted security level. Otherwise, the attachment is actually a link to the published location.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable sending form template with e-mail forms" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\deployment Criteria: If the value MailXSNwithXML is REG_DWORD = 0, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable sending form template with e-mail forms" to "Enabled".
V-17668 Added
Findings ID: DTOO170 Rule ID: SV-53379r1_rule Severity: medium CCI: CCI-001170

Discussion

An attacker might target InfoPath 2003 forms to try and compromise an organization's security. InfoPath 2003 did not write a published location for email forms, which means forms could open without a corresponding published location. By default, InfoPath sends all forms via email using InfoPath email forms integration, including forms created using the InfoPath 2003 file format.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable sending InfoPath 2003 Forms as e-mail forms" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath Criteria: If the value DisableInfoPath2003EmailForms is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable sending InfoPath 2003 Forms as e-mail forms" to "Enabled".
V-17745 Added
Findings ID: DTOO164 Rule ID: SV-53357r1_rule Severity: medium CCI: CCI-002460

Discussion

Malicious users can create InfoPath forms with embedded Web beacons that can be used to contact an external server when the user opens the form. Information could be gathered by the form, or information entered by users could be sent to an external server and cause them to be vulnerable to additional attacks. By default, InfoPath warns users about potential Web beaconing threats.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Beaconing UI for forms opened in InfoPath" must be set to "Enabled (Always show beaconing UI)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value InfoPathBeaconingUI is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Beaconing UI for forms opened in InfoPath" to "Enabled (Always show beaconing UI)".
V-17746 Added
Findings ID: DTOO165 Rule ID: SV-53359r1_rule Severity: medium CCI: CCI-002460

Discussion

InfoPath makes it possible to host InfoPath forms in other applications as ActiveX controls. Such controls are known as InfoPath form controls. A malicious user could insert a web beacon into one of these controls which could be used to contact an external server when the user opens the form. Information could be gathered by the form, or information entered by users could be sent to an external server and expose the internal systems to additional attacks. By default, InfoPath form controls warn users about potential web beaconing threats.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Beaconing UI for forms opened in InfoPath Filler ActiveX" must be set to "Enabled (Always show beaconing UI)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value EditorActiveXBeaconingUI is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Beaconing UI for forms opened in InfoPath Filler ActiveX" to "Enabled (Always show beaconing UI)".
V-17758 Added
Findings ID: DTOO156 Rule ID: SV-53335r2_rule Severity: medium CCI: CCI-000366

Discussion

InfoPath can function in online mode or offline mode. It can also cache queries for use in offline mode. If offline mode is used and cached queries are enabled, sensitive information contained in the cache could be at risk. By default, InfoPath is in online mode, but offline mode is available to users. Users can also cache queries for use in offline mode.System AdministratorInformation Assurance Officer

Checks

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath Options -> Advanced -> Offline "Offline Mode status" is set to "Enabled (Enabled, InfoPath not in Offline Mode)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\editor\offline Criteria: If the value CachedModeStatus is REG_DWORD = 2, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath Options -> Advanced -> Offline "Offline Mode status" to "Enabled (Enabled, InfoPath not in Offline Mode)".
V-17764 Added
Findings ID: DTOO160 Rule ID: SV-53355r1_rule Severity: medium CCI: CCI-001170

Discussion

Users can attach any type of file to forms except potentially unsafe files that might contain viruses, such as .bat or .exe files. For the full list of file types that InfoPath disallows by default, see "Security Details" in Insert a file attachment control on the Microsoft Office Online website. If unsafe file types are added to InfoPath forms, they might be used as a means of attacking the computer on which the form is opened. These unsafe file types may include active content, or may introduce other vulnerabilities that an attacker can exploit.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Prevent users from allowing unsafe file types to be attached to forms" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> "Prevent users from allowing unsafe file types to be attached to forms" to "Enabled".
V-26589 Added
Findings ID: DTOO127 Rule ID: SV-53328r1_rule Severity: medium CCI: CCI-001749

Discussion

Office 2013 applications do not check the digital signature on application add-ins before opening them. Disabling or not configuring this setting may allow an application to load a dangerous add-in. As a result, malicious code could become active on user computers or the network.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
V-26618 Added
Findings ID: DTOO294 Rule ID: SV-53385r1_rule Severity: medium CCI: CCI-001170

Discussion

InfoPath email forms can be designed by an internal attacker and sent over the local intranet, and users might fill out such forms and provide sensitive information to the attacker. By default, forms that originate from the local intranet can be opened.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable e-mail forms from the Intranet security zone" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value EnableIntranetEMailForms is REG_DWORD = 0, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable e-mail forms from the Intranet security zone" to "Enabled".
V-26619 Added
Findings ID: DTOO295 Rule ID: SV-53389r1_rule Severity: medium CCI: CCI-001170

Discussion

Attackers can send users InfoPath email forms in an attempt to gain access to confidential information. Depending on the level of trust of the forms, it might also be possible to gain access to other data automatically. By default, Outlook 2013 uses the InfoPath email forms feature to render forms in Outlook and allows users to fill them out in place.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable InfoPath e-mail forms in Outlook" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value DisableInfopathForms is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> InfoPath e-mail forms "Disable InfoPath e-mail forms in Outlook" to "Enabled".
V-26620 Added
Findings ID: DTOO296 Rule ID: SV-53392r1_rule Severity: medium CCI: CCI-001170

Discussion

When InfoPath solutions are opened locally, the location of the form is checked so that updates to the form can be downloaded. If a user saves a form locally from a location on the Internet and then opens the same form from another location on the Internet, the cache will be updated with the new location information. If the user then opens the first form from its saved location, there will be a mismatch between the locally saved form and the locally cached form. This situation would typically happen when developers move forms to a new location, but if there is no warning when the cached location is used, it could be misused by an attacker attempting to redirect the forms to a new location. This type of attack is a form of beaconing. By default, if the location information in the cached form and the saved form to not match, the form cannot be opened without prompting the user for consent.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security "Disable opening forms with managed code from the Internet security zone" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value RunManagedCodeFromInternet is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security "Disable opening forms with managed code from the Internet security zone" to "Enabled".
V-26621 Added
Findings ID: DTOO297 Rule ID: SV-53432r1_rule Severity: medium CCI: CCI-001749

Discussion

This setting controls whether or not the user sees a dialog box when opening Microsoft InfoPath forms containing digitally signed content. By default, InfoPath shows the user a warning message when the form contains a digital signature. By being aware of a digitally signed form, the user will be able to check the validity of the signature. Otherwise, the forms may have been maliciously modified and will be invalidated.System AdministratorInformation Assurance Officer

Checks

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security "Display a warning that a form is digitally signed" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security Criteria: If the value SignatureWarning is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security "Display a warning that a form is digitally signed" to "Enabled".
V-26697 Added
Findings ID: DTOO309 Rule ID: SV-53452r1_rule Severity: medium CCI: CCI-000366

Discussion

InfoPath 2013 forms' business logic can only call into Global Assembly Cache (GAC) assemblies listed in the APTCA Assembly Allowable List. If this configuration is changed, forms can call into any assembly in the GAC where the Allow Partially Trusted Callers Attribute (APTCA) is set. This configuration could allow malicious developers to access assemblies in the GAC not intended to be used by InfoPath forms.System AdministratorInformation Assurance Officer

Checks

The policy value for Computer Configuration -> Administrative Templates -> Microsoft InfoPath 2013 (Machine) -> Security "InfoPath APTCA Assembly Allowable List Enforcement" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\office\15.0\InfoPath\security Criteria: If the value APTCA_AllowList is REG_DWORD = 1, this is not a finding.

Fix

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft InfoPath 2013 (Machine) -> Security "InfoPath APTCA Assembly Allowable List Enforcement" to "Enabled".