Check: RHEL-09-232240
RHEL 9 STIG:
RHEL-09-232240
(in version v2 r7)
Title
All RHEL 9 world-writable directories must be owned by root, sys, bin, or an application user. (Cat II impact)
Discussion
If a world-writable directory is not owned by root, sys, bin, or an application user identifier (UID), unauthorized users may be able to modify files created by others. The only authorized public directories are those temporary directories supplied with the system or those designed to be temporary file repositories. The setting is normally reserved for directories used by the system and by users for temporary file storage, (e.g., /tmp), and for directories requiring global read/write access. Satisfies: SRG-OS-000480-GPOS-00227, SRG-OS-000138-GPOS-00069
Check Content
Verify RHEL 9 world writable directories are owned by root, a system account, or an application account with the following command: $ sudo find / -xdev -type d -perm -0002 -uid +999 -exec stat -c "%U, %u, %A, %n" {} \; 2>/dev/null If there is output that indicates world-writable directories are owned by any account other than root or an approved system account, this is a finding.
Fix Text
Configure all RHEL 9 public directories to be owned by root or a system account to prevent unauthorized and unintended information transferred via shared system resources. Use the following command template to set ownership of public directories to root or a system account: $ sudo chown [root or system account] [Public Directory]
Additional Identifiers
Rule ID: SV-257928r1155576_rule
Vulnerability ID: V-257928
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-001090 |
Prevent unauthorized and unintended information transfer via shared system resources. |
Controls
| Number | Title |
|---|---|
| SC-4 |
Information in Shared System Resources |