Excessive privileges - Access Mode
Description
The system files or directories have an access mode too permissive
Impact
- Read, write or execute files
- Create potentially harmful files
Recommendation
System files and directories must be restricted by a custom permission mask, for example an access mode 0600
Threat
Anonymous attacker with local access to the machine
Expected Remediation Time
⌚ 15 minutes.
Score
Default score using CVSS 3.1. It may change depending on the context of the vulnerability.
Base
- Attack vector: L
- Attack complexity: L
- Privileges required: N
- User interaction: N
- Scope: U
- Confidentiality: L
- Integrity: L
- Availability: L
Temporal
- Exploit code madurity: P
- Remediation level: O
- Report confidence: C
Result
- Vector string: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
- Score:
- Base: 5.9
- Temporal: 5.3
- Severity:
- Base: Medium
- Temporal: Medium
Code Examples
Compliant code
There is a secure access mode configuration
Name: task-pv-volume
Labels: type=local
StorageClass: standard
Status: Terminating
Claim:
Reclaim Policy: Delete
Access Modes: 0600
Capacity: 1Gi
Message:
Source:
Type: HostPath
Path: /tmp/data
HostPathType:
Events: <none>
Non compliant code
The access modes are too permissive
Name: task-pv-volume
Labels: type=local
StorageClass: standard
Status: Terminating
Claim:
Reclaim Policy: Delete
Access Modes: *
Capacity: 1Gi
Message:
Source:
Type: HostPath
Path: /tmp/data
HostPathType:
Events: <none>
Requirements
- 033. Restrict administrative access
- 176. Restrict system objects
- 265. Restrict access to critical processes
- 280. Restrict service root directory
free trial
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.