[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-95456-0

Platform: cpe:/o:amazon:linux:2, cpe:/o:centos:centos:7, cpe:/o:oracle:linux:7, cpe:/o:oracle:linux:8, cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:enterprise_linux:9Date: (C)2021-03-05   (M)2023-07-04



Description: The grub configuration file contains information on boot settings and passwords for unlocking boot options. The grub configuration is usually grub.cfg and grubenv stored in/boot/grub2/` Rationale: Setting the permissions to read and write for root only prevents non-root users from seeing the boot parameters or changing them. Non-root users who read the boot parameters may be able to identify weaknesses in security upon boot and be able to exploit them. Audit: Run the following commands and verify Uid and Gid are both 0/root and Access does not grant permissions to group or other : # stat /boot/grub2/grub.cfg Access: (0600/-rw-------) Uid: ( 0/ root) Gid: ( 0/ root) # stat /boot/grub2/grubenv Access: (0600/-rw-------) Uid: ( 0/ root) Gid: ( 0/ root) Remediation: Run the following commands to set permissions on your grub configuration: # chown root:root /boot/grub2/grub.cfg # chmod og-rwx /boot/grub2/grub.cfg # chown root:root /boot/grub2/grubenv # chmod og-rwx /boot/grub2/grubenv Notes: This recommendation is designed around the grub bootloader, if LILO or another bootloader is in use in your environment enact equivalent settings. Replace /boot/grub2/grub.cfg and /boot/grub2/grubenv with the appropriate configuration file(s) for your environment


Parameter:

[110000000, root, root]


Technical Mechanism:

Run the following commands to set permissions on your grub configuration: # chown root:root /boot/grub2/grub.cfg # chmod og-rwx /boot/grub2/grub.cfg # chown root:root /boot/grub2/grubenv # chmod og-rwx /boot/grub2/grubenv

CCSS Severity:CCSS Metrics:
CCSS Score : 8.8Attack Vector: LOCAL
Exploit Score: 2.0Attack Complexity: LOW
Impact Score: 6.0Privileges Required: LOW
Severity: HIGHUser Interaction: NONE
Vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HScope: CHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:72693
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:73007
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:72414
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:72902
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:68607
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:72048
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:72796
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:84288


OVAL    8
oval:org.secpod.oval:def:84288
oval:org.secpod.oval:def:72902
oval:org.secpod.oval:def:72048
oval:org.secpod.oval:def:72796
...
XCCDF    8
xccdf_org.secpod_benchmark_general_Amazon_Linux_AMI
xccdf_org.secpod_benchmark_general_CENTOS_7
xccdf_org.secpod_benchmark_general_RHEL_8
xccdf_org.secpod_benchmark_general_OEL_8
...

© SecPod Technologies