STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 8 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

All RHEL 8 world-writable directories must be owned by root, sys, bin, or an application group.

DISA Rule

SV-230318r627750_rule

Vulnerability Number

V-230318

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

RHEL-08-010700

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

All directories in local partitions which are world-writable should be owned by root or another system account. If any world-writable directories are not owned by a system account, this should be investigated. Following this, the files should be deleted or assigned to an appropriate group.

Check Contents

The following command will discover and print world-writable directories that are not owned by a system account, given the assumption that only system accounts have a uid lower than 1000. Run it once for each local partition [PART]:

$ sudo find [PART] -xdev -type d -perm -0002 -uid +999 -print

If there is output, this is a finding.

Vulnerability Number

V-230318

Documentable

False

Rule Version

RHEL-08-010700

Severity Override Guidance

The following command will discover and print world-writable directories that are not owned by a system account, given the assumption that only system accounts have a uid lower than 1000. Run it once for each local partition [PART]:

$ sudo find [PART] -xdev -type d -perm -0002 -uid +999 -print

If there is output, this is a finding.

Check Content Reference

M

Target Key

2921

Comments