The InfoPath APTCA Assembly Allowable List must be enforced.

From Microsoft InfoPath 2010

Part of DTOO309 - APTCA Assembly Allow List Enforcement

SV-34226r1_rule The InfoPath APTCA Assembly Allowable List must be enforced.

Vulnerability discussion

InfoPath 2010 forms' business logic can only call into Global Assembly Cache (GAC) assemblies listed in the APTCA Assembly Allowable List. If this configuration is changed, forms can call into any assembly in the GAC where the Allow Partially Trust Callers Attribute (APTCA) is set. This configuration could allow malicious developers to access assemblies in the GAC not intended to be used by InfoPath forms.

Check content

The policy value for Computer Configuration -> Administrative Templates -> Microsoft InfoPath 2010 (Machine) -> Security “InfoPath APTCA Assembly Allowable List Enforcement” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\office\14.0\infopath\security Criteria: If the value APTCA_AllowList is REG_DWORD = 1, this is not a finding.

Fix text

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft InfoPath 2010 (Machine) -> Security “InfoPath APTCA Assembly Allowable List Enforcement” to “Enabled”.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer